Cybersecurity Incident Response
How to Contain, Eradicate, and Recover from Incidents
Price | $24.90 - $31.80
|
Rating | |
Author | Eric C. Thompson |
Publisher | Apress |
Published | 2018 |
Pages | 176 |
Language | English |
Format | Paper book / ebook (PDF) |
ISBN-10 | 1484238699 |
ISBN-13 | 9781484238691 |
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.
Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.
The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing, Detection, Containment, Eradication, Post-incident actions.
Know the sub-categories of the NIST Cybersecurity Framework; Understand the components of incident response; Go beyond the incident response plan; Turn the plan into a program that needs vision, leadership, and culture to make it successful; Be effective in your role on the incident response team.
- Eric C. Thompson
4 5 8
Similar Books
Intelligence-Driven Incident Response
by Scott Roberts, Rebekah Brown
Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'...
Price: $42.88 | Publisher: O'Reilly Media | Release: 2017
by Jeff Bollinger, Brandon Enright, Matthew Valites
Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop you...
Price: $39.56 | Publisher: O'Reilly Media | Release: 2015
PowerShell and Python Together
by Chet Hosmer
Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's robust set of commands and access to the internals of both th...
Price: $25.80 | Publisher: Apress | Release: 2019
Designing a HIPAA-Compliant Security Operations Center
by Eric Thompson
Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to ope...
Price: $29.90 | Publisher: Apress | Release: 2020
Microsoft Azure Security Center, 2nd Edition
by Yuri Diogenes, Tom Shinder
Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key ...
Price: $39.99 | Publisher: Microsoft Press | Release: 2019
by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters
Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incid...
Price: $34.00 | Publisher: Wiley | Release: 2014
Principles of Computer Security, 5th Edition
by Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger L. Davis, Dwayne Williams
Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Writte...
Price: $80.00 | Publisher: McGraw-Hill | Release: 2018
Oracle Incident Response and Forensics
by Pete Finnigan
Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done.This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used...
Price: $22.25 | Publisher: Apress | Release: 2018