Crafting the InfoSec Playbook - Security Monitoring and Incident Response Master Plan - E-book - Multi-format

Edition en anglais

Matthew Valites

,

Brandon Enright

,

Jeff Bollinger

Note moyenne 
Matthew Valites et Brandon Enright - Crafting the InfoSec Playbook - Security Monitoring and Incident Response Master Plan.
Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates... Lire la suite
36,99 € E-book - Multi-format
Vous pouvez lire cet ebook sur les supports de lecture suivants :
Bientôt disponible
Recevez un email dès que l'ouvrage est disponible

Résumé

Any good attacker will tell you that expensive security monitoring and prevention tools aren't enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You'll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco's Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. - Learn incident response fundamentals-and the importance of getting back to basics - Understand threats you face and what you should be protecting - Collect, mine, organize, and analyze as many relevant data sources as possible - Build your own playbook of repeatable methods for security monitoring and response - Learn how to put your plan into action and keep it running smoothly - Select the right monitoring and detection tools for your environment - Develop queries to help you sort through data and create valuable reports - Know what actions to take during the incident response phase

Caractéristiques

  • Date de parution
    07/05/2015
  • Editeur
    O'Reilly Media
  • ISBN
    978-1-4919-4939-9
  • EAN
    9781491949399
  • Format
    Multi-format
  • Nb. de pages
    276 pages
  • Caractéristiques du format Multi-format
    • Pages
      276
  • Caractéristiques du format PDF
    • Protection num.
      pas de protection
  • Caractéristiques du format ePub
    • Protection num.
      pas de protection
  • Caractéristiques du format Mobipocket
    • Protection num.
      pas de protection
  • Caractéristiques du format Streaming
    • Protection num.
      pas de protection

Avis libraires et clients

Avis audio

Écoutez ce qu'en disent nos libraires !

À propos des auteurs

Matthew Valites is a senior investigator and site lead on Cisco's Computer Security Incident Response Team (CSIRT). He provides expertise building an Incident Response and monitoring program for cloud and hosted service enterprises, with a focus on targeted and high-value assets. A hobbyist Breaker and Maker for as long as he can recall, his current professional responsibilities include security investigations, mining security-centric alerts from large data sets, operationalizing CSIRT's detection logic, and mobile device hacking.
Matt enjoys speaking at international conferences, and is keen to share CSIRT's knowledge, best practices, and lessons-learned. Brandon Enright is a senior information security investigator with Cisco Systems. Brandon has a bachelor's degree in computer science from UC San Diego where he did research in the Systems and Networking group. Brandon has coauthored several papers on the infrastructure and economics of malware botnets and a paper on the impact of low entropy seeds on the generation of SSL certificates.
Some of his work in cryptography includes presenting weaknesses in some of the NIST SHA3 competition candidates, fatally knocking one out of the competition, and authoring the Password Hashing Competition proposal OmegaCrypt. Brandon is a long-time contributor to the Nmap project, a fast and featureful port scanner and security tool. In his free time Brandon enjoys mathematical puzzles and logic games. With over ten years of information security experience, Jeff Bollinger has worked as a security architect and incident responder for both academic and corporate networks.
Specializing in investigations, network security monitoring, and intrusion detection, Jeff Bollinger currently works as an information security investigator, and has built and operated one of the world's largest corporate security monitoring infrastructures. Jeff regularly speaks at international FIRST conferences, and writes for the Cisco Security Blog. His recent work includes log mining, search optimization, threat research, and security investigations.

Derniers produits consultés