Agile Security Operations Agile Security Operations

Agile Security Operations

Engineering for agility in cyber defense, detection, and response

    • $31.99
    • $31.99

Publisher Description

Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile threat intelligence

Key Features
Explore robust and predictable security operations based on measurable service performanceLearn how to improve the security posture and work on security auditsDiscover ways to integrate agile security operations into development and operations
Book Description

Agile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best.

Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. You'll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding.

By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference.

What you will learn
Get acquainted with the changing landscape of security operationsUnderstand how to sense an attacker's motives and capabilitiesGrasp key concepts of the kill chain, the ATT&CK framework, and the Cynefin frameworkGet to grips with designing and developing a defensible security architectureExplore detection and response engineeringOvercome challenges in measuring the security postureDerive and communicate business values through security operationsDiscover ways to implement security as part of development and business operations
Who this book is for

This book is for new and established CSOC managers as well as CISO, CDO, and CIO-level decision-makers. If you work as a cybersecurity engineer or analyst, you'll find this book useful. Intermediate-level knowledge of incident response, cybersecurity, and threat intelligence is necessary to get started with the book.

GENRE
Computers & Internet
RELEASED
2022
February 17
LANGUAGE
EN
English
LENGTH
254
Pages
PUBLISHER
Packt Publishing
SELLER
Ingram DV LLC
SIZE
6.7
MB
Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time Engineering Trustworthy Systems: Get Cybersecurity Design Right the First Time
2018
Cybersecurity Incident Response Cybersecurity Incident Response
2018
Theoretical Cybersecurity Theoretical Cybersecurity
2022
Enterprise Cybersecurity Enterprise Cybersecurity
2015
Mastering Cyber Intelligence Mastering Cyber Intelligence
2022
Secrets of a Cyber Security Architect Secrets of a Cyber Security Architect
2019
Certified Information Systems Security Professional (CISSP) Exam Guide Certified Information Systems Security Professional (CISSP) Exam Guide
2024
The Union of Chemistry and Physics The Union of Chemistry and Physics
2017