Incident Response in the Age of Cloud
Packt Publishing Limited (Verlag)
978-1-80056-921-8 (ISBN)
Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequences
Key Features
Discover Incident Response (IR), from its evolution to implementation
Understand cybersecurity essentials and IR best practices through real-world phishing incident scenarios
Explore the current challenges in IR through the perspectives of leading experts
Book DescriptionCybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes.
In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks.
The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting.
Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere.
By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently.
What you will learn
Understand IR and its significance
Organize an IR team
Explore best practices for managing attack situations with your IR team
Form, organize, and operate a product security team to deal with product vulnerabilities and assess their severity
Organize all the entities involved in product security response
Respond to security vulnerabilities using tools developed by Keepnet Labs and Binalyze
Adapt all the above learnings for the cloud
Who this book is forThis book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book.
The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn’t mandatory.
Dr. Erdal Ozkaya is a technically sophisticated executive leader with solid education and strong business acumen. Over the course of his progressive career, he has developed a keen aptitude for facilitating integration of standard operating procedures that ensures optimal functionality of all technical functions and systems. Being a proactive communicator, trusted partner, and an award-winning leader, he is highly adept at building dynamic teams that work together to expedite operational goals, priorities, and objectives. As a result, he is poised to conduct reviews and investigations with prompt efficiency and provide thorough and informative reports to both internal and external stakeholders.
Table of Contents
Getting Started with Incident Response
Incident Response - Evolution and Current Challenges
How to Organize an Incident Response Team
Key Metrics for Incident Response
Methods and Tools of Incident Response Processes
Incident Handling
Incident Investigation
Incident Reporting
Incident Response on Multiple Platforms
Cyber Threat Intelligence Sharing
Incident Response in the Cloud
Building a Culture of Incident Readiness
Incident Response Best Practices
Incident Case Studies
Ask the Experts
| Erscheinungsdatum | 09.03.2021 |
|---|---|
| Verlagsort | Birmingham |
| Sprache | englisch |
| Maße | 75 x 93 mm |
| Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
| ISBN-10 | 1-80056-921-1 / 1800569211 |
| ISBN-13 | 978-1-80056-921-8 / 9781800569218 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich