000 04586cam a2200457Ia 4500
001 on1159165163
003 OCoLC
005 20220711203605.0
006 m d
007 cr un|---aucuu
008 200620s2020 inu o 001 0 eng d
040 _aEBLCP
_beng
_cEBLCP
_dDG1
_dUKAHL
_dOCLCF
_dYDX
020 _a9781119679349
_q(electronic bk. : oBook)
020 _a1119679346
_q(electronic bk. : oBook)
020 _a9781119679318
020 _a1119679311
035 _a(OCoLC)1159165163
050 4 _aQA76.9.A25
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aGorecki, Andrew.
_99102
245 1 0 _aCyber breach response that actually works
_h[electronic resource] :
_borganizational approach to managing residual risk /
_cAndrew Gorecki.
260 _aIndianapolis :
_bWiley,
_c2020.
300 _a1 online resource (323 p.)
500 _aDescription based upon print version of record.
505 0 _aCover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editors -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Who Should Read This Book -- How This Book Is Organized -- How to Contact Wiley or the Author -- Notes -- Chapter 1 Understanding the Bigger Picture -- Evolving Threat Landscape -- Identifying Threat Actors -- Cyberattack Lifecycle -- Defining Cyber Breach Response -- Events, Alerts, Observations, Incidents, and Breaches -- What Is Cyber Breach Response? -- Identifying Drivers for Cyber Breach Response -- Risk Management
505 8 _aCyber Threat Intelligence -- Laws and Regulations -- Changing Business Objectives -- Incorporating Cyber Breach Response into a Cybersecurity Program -- Strategic Planning -- Designing a Program -- Implementing Program Components -- Program Operations -- Continual Improvement -- Strategy Development -- Strategic Assessment -- Strategy Definition -- Strategy Execution -- Roadmap Development -- Governance -- Establishing Policies -- Identifying Key Stakeholders -- Business Alignment -- Continual Improvement -- Summary -- Notes -- Chapter 2 Building a Cybersecurity Incident Response Team
505 8 _aDefining a CSIRT -- CSIRT History -- Defining Incident Response Competencies and Functions -- Proactive Functions -- Reactive Functions -- Creating an Incident Response Team -- Creating an Incident Response Mission Statement -- Choosing a Team Model -- Organizing an Incident Response Team -- Hiring and Training Personnel -- Establishing Authority -- Introducing an Incident Response Team to the Enterprise -- Enacting a CSIRT -- Defining a Coordination Model -- Communication Flow -- Assigning Roles and Responsibilities -- Business Functions -- Legal and Compliance
505 8 _aInformation Technology Functions -- Senior Management -- Working with Outsourcing Partners -- Outsourcing Considerations -- Establishing Successful Relationships with Vendors -- Summary -- Notes -- Chapter 3 Technology Considerations in Cyber Breach Investigations -- Sourcing Technology -- Comparing Commercial vs. Open Source Tools -- Developing In-House Software Tools -- Procuring Hardware -- Acquiring Forensic Data -- Forensic Acquisition -- Live Response -- Incident Response Investigations in Virtualized Environments -- Traditional Virtualization -- Cloud Computing
505 8 _aLeveraging Network Data in Investigations -- Identifying Forensic Evidence in Enterprise Technology Services -- Domain Name System -- Dynamic Host Configuration Protocol -- Web Servers -- Databases -- Security Tools -- Log Management -- What Is Logging? -- What Is Log Management? -- Log Management Lifecycle -- Collection and Storage -- Managing Logs with a SIEM -- Summary -- Notes -- Chapter 4 Crafting an Incident Response Plan -- Incident Response Lifecycle -- Preparing for an Incident -- Detecting and Analyzing Incidents -- Containment, Eradication, and Recovery -- Post-Incident Activities
500 _aUnderstanding Incident Management
500 _aIncludes index.
590 _aJohn Wiley and Sons
_bWiley Frontlist Obook All English 2020
650 0 _aComputer security
_xManagement.
_94979
650 7 _aComputer security
_xManagement.
_2fast
_0(OCoLC)fst00872493
_94979
655 4 _aElectronic books.
_93294
776 0 8 _iPrint version:
_aGorecki, Andrew
_tCyber Breach Response That Actually Works : Organizational Approach to Managing Residual Risk
_dNewark : John Wiley & Sons, Incorporated,c2020
_z9781119679325
856 4 0 _uhttps://doi.org/10.1002/9781119679349
_zWiley Online Library
942 _cEBK
994 _a92
_bDG1
999 _c69286
_d69286