Cybersecurity Incident Response

How to Contain, Eradicate, and Recover from Incidents



Bookstore > Books > Cybersecurity Incident Response

Price$24.90 - $31.80
Rating
AuthorEric C. Thompson
PublisherApress
Published2018
Pages176
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-101484238699
ISBN-139781484238691
EBook Hardcover Paperback

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.

The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include: Planning and practicing, Detection, Containment, Eradication, Post-incident actions.

Know the sub-categories of the NIST Cybersecurity Framework; Understand the components of incident response; Go beyond the incident response plan; Turn the plan into a program that needs vision, leadership, and culture to make it successful; Be effective in your role on the incident response team.




4 5 8

Similar Books


Intelligence-Driven Incident Response

Intelligence-Driven Incident Response

by Scott Roberts, Rebekah Brown

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'...

Price:  $42.88  |  Publisher:  O'Reilly Media  |  Release:  2017

Crafting the InfoSec Playbook

Crafting the InfoSec Playbook

by Jeff Bollinger, Brandon Enright, Matthew Valites

Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop you...

Price:  $39.56  |  Publisher:  O'Reilly Media  |  Release:  2015

PowerShell and Python Together

PowerShell and Python Together

by Chet Hosmer

Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators.You will learn how to join PowerShell's robust set of commands and access to the internals of both th...

Price:  $25.80  |  Publisher:  Apress  |  Release:  2019

Designing a HIPAA-Compliant Security Operations Center

Designing a HIPAA-Compliant Security Operations Center

by Eric Thompson

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to ope...

Price:  $29.90  |  Publisher:  Apress  |  Release:  2020

Microsoft Azure Security Center, 2nd Edition

Microsoft Azure Security Center, 2nd Edition

by Yuri Diogenes, Tom Shinder

Reflecting updates through mid-2019, this book presents comprehensive Azure Security Center techniques for safeguarding cloud and hybrid environments. Leading Microsoft security and cloud experts Yuri Diogenes and Dr. Thomas Shinder help you apply Azure Security Center's robust protection, detection, and response capabilities in key ...

Price:  $39.99  |  Publisher:  Microsoft Press  |  Release:  2019

The Art of Memory Forensics

The Art of Memory Forensics

by Michael Hale Ligh, Andrew Case, Jamie Levy, AAron Walters

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incid...

Price:  $34.00  |  Publisher:  Wiley  |  Release:  2014

Principles of Computer Security, 5th Edition

Principles of Computer Security, 5th Edition

by Wm. Arthur Conklin, Greg White, Chuck Cothren, Roger L. Davis, Dwayne Williams

Learn IT security fundamentals while getting complete coverage of the objectives for the latest release of CompTIA Security+ certification exam SY0-501. This thoroughly revised, full-color textbook discusses communication, infrastructure, operational security, attack prevention, disaster recovery, computer forensics, and much more. Writte...

Price:  $80.00  |  Publisher:  McGraw-Hill  |  Release:  2018

Oracle Incident Response and Forensics

Oracle Incident Response and Forensics

by Pete Finnigan

Take the right steps when a breach of your Oracle Database environment becomes known or suspected. You will learn techniques for discerning how an attacker got in, what data they saw, and what else they might have done.This book helps you understand forensics in relation to Oracle Database, and the tools and techniques that should be used...

Price:  $22.25  |  Publisher:  Apress  |  Release:  2018