Crafting the InfoSec Playbook Crafting the InfoSec Playbook

Crafting the InfoSec Playbook

Security Monitoring and Incident Response Master Plan

Jeff Bollinger and Others
    • €43.99
    • €43.99

Publisher Description

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.

Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.
Learn incident response fundamentals—and the importance of getting back to basicsUnderstand threats you face and what you should be protectingCollect, mine, organize, and analyze as many relevant data sources as possibleBuild your own playbook of repeatable methods for security monitoring and responseLearn how to put your plan into action and keep it running smoothlySelect the right monitoring and detection tools for your environmentDevelop queries to help you sort through data and create valuable reportsKnow what actions to take during the incident response phase

GENRE
Computing & Internet
RELEASED
2015
7 May
LANGUAGE
EN
English
LENGTH
276
Pages
PUBLISHER
O'Reilly Media
PROVIDER INFO
OREILLY MEDIA INC
SIZE
10.1
MB
CompTIA CySA+ Study Guide CompTIA CySA+ Study Guide
2023
Cybersecurity All-in-One For Dummies Cybersecurity All-in-One For Dummies
2023
Threat Modeling Threat Modeling
2014
The InfoSec Handbook The InfoSec Handbook
2014
Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security Hacking for Beginners: Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security
2020
Foundations of Information Security Foundations of Information Security
2019