Cyber breach response that actually works : (Record no. 12714)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 07588cam a2200661 a 4500 |
001 - CONTROL NUMBER | |
control field | on1159165163 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | OCoLC |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240523125542.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr un|---aucuu |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 200620s2020 inu o 001 0 eng d |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | EBLCP |
Language of cataloging | eng |
Description conventions | pn |
Transcribing agency | EBLCP |
Modifying agency | DG1 |
-- | UKAHL |
-- | OCLCF |
-- | YDX |
-- | RECBK |
-- | OCLCQ |
-- | OCLCO |
-- | K6U |
-- | OCLCO |
-- | OCLCQ |
-- | OCLCO |
-- | SFB |
-- | IEEEE |
-- | OCLCQ |
-- | UPM |
-- | OCLCQ |
-- | OCLCO |
-- | OCLCL |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119679349 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119679346 |
Qualifying information | (electronic bk. ; |
-- | oBook) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119679318 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119679311 |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781119679356 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 1119679354 |
Qualifying information | (electronic bk.) |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1002/9781119679349 |
Source of number or code | doi |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | AU@ |
System control number | 000067555882 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHNEW |
System control number | 001087404 |
029 1# - OTHER SYSTEM CONTROL NUMBER (OCLC) | |
OCLC library identifier | CHVBK |
System control number | 598948120 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1159165163 |
037 ## - SOURCE OF ACQUISITION | |
Stock number | 9820878 |
Source of stock number/acquisition | IEEE |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.8 |
Edition number | 23 |
049 ## - LOCAL HOLDINGS (OCLC) | |
Holding library | MAIN |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | Gorecki, Andrew. |
245 10 - TITLE STATEMENT | |
Title | Cyber breach response that actually works : |
Remainder of title | organizational approach to managing residual risk / |
Statement of responsibility, etc. | Andrew Gorecki. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Place of publication, distribution, etc. | Indianapolis : |
Name of publisher, distributor, etc. | Wiley, |
Date of publication, distribution, etc. | 2020. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (323 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
588 0# - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Print version record. |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editors -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Who Should Read This Book -- How This Book Is Organized -- How to Contact Wiley or the Author -- Notes -- Chapter 1 Understanding the Bigger Picture -- Evolving Threat Landscape -- Identifying Threat Actors -- Cyberattack Lifecycle -- Defining Cyber Breach Response -- Events, Alerts, Observations, Incidents, and Breaches -- What Is Cyber Breach Response? -- Identifying Drivers for Cyber Breach Response -- Risk Management |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cyber Threat Intelligence -- Laws and Regulations -- Changing Business Objectives -- Incorporating Cyber Breach Response into a Cybersecurity Program -- Strategic Planning -- Designing a Program -- Implementing Program Components -- Program Operations -- Continual Improvement -- Strategy Development -- Strategic Assessment -- Strategy Definition -- Strategy Execution -- Roadmap Development -- Governance -- Establishing Policies -- Identifying Key Stakeholders -- Business Alignment -- Continual Improvement -- Summary -- Notes -- Chapter 2 Building a Cybersecurity Incident Response Team |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Defining a CSIRT -- CSIRT History -- Defining Incident Response Competencies and Functions -- Proactive Functions -- Reactive Functions -- Creating an Incident Response Team -- Creating an Incident Response Mission Statement -- Choosing a Team Model -- Organizing an Incident Response Team -- Hiring and Training Personnel -- Establishing Authority -- Introducing an Incident Response Team to the Enterprise -- Enacting a CSIRT -- Defining a Coordination Model -- Communication Flow -- Assigning Roles and Responsibilities -- Business Functions -- Legal and Compliance |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Information Technology Functions -- Senior Management -- Working with Outsourcing Partners -- Outsourcing Considerations -- Establishing Successful Relationships with Vendors -- Summary -- Notes -- Chapter 3 Technology Considerations in Cyber Breach Investigations -- Sourcing Technology -- Comparing Commercial vs. Open Source Tools -- Developing In-House Software Tools -- Procuring Hardware -- Acquiring Forensic Data -- Forensic Acquisition -- Live Response -- Incident Response Investigations in Virtualized Environments -- Traditional Virtualization -- Cloud Computing |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Leveraging Network Data in Investigations -- Identifying Forensic Evidence in Enterprise Technology Services -- Domain Name System -- Dynamic Host Configuration Protocol -- Web Servers -- Databases -- Security Tools -- Log Management -- What Is Logging? -- What Is Log Management? -- Log Management Lifecycle -- Collection and Storage -- Managing Logs with a SIEM -- Summary -- Notes -- Chapter 4 Crafting an Incident Response Plan -- Incident Response Lifecycle -- Preparing for an Incident -- Detecting and Analyzing Incidents -- Containment, Eradication, and Recovery -- Post-Incident Activities |
500 ## - GENERAL NOTE | |
General note | Understanding Incident Management |
500 ## - GENERAL NOTE | |
General note | Includes index. |
520 ## - SUMMARY, ETC. | |
Summary, etc. | You will be breached'the only question is whether you'll be ready'''' A cyber breach could cost your organization millions of dollars'in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its impact to your enterprise. This book goes beyond step-by-step instructions for technical staff, focusing on big-picture planning and strategy that makes the most business impact. Inside, you'll learn what drives cyber incident response and how to build effective incident response capabilities. Expert author Andrew Gorecki delivers a vendor-agnostic approach based on his experience with Fortune 500 organizations.-Understand the evolving threat landscape and learn how to address tactical and strategic challenges to build a comprehensive and cohesive cyber breach response program -Discover how incident response fits within your overall information security program, including a look at risk management -Build a capable incident response team and create an actionable incident response plan to prepare for cyberattacks and minimize their impact to your organization -Effectively investigate small and large-scale incidents and recover faster by leveraging proven industry practices -Navigate legal issues impacting incident response, including laws and regulations, criminal cases and civil litigation, and types of evidence and their admissibility in court In addition to its valuable breadth of discussion on incident response from a business strategy perspective, Cyber Breach Response That Actually Works offers information on key technology considerations to aid you in building an effective capability and accelerating investigations to ensure your organization can continue business operations during significant cyber events. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | John Wiley and Sons |
Provenance (VM) [OBSOLETE] | Wiley Online Library: Complete oBooks |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
General subdivision | Management. |
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | S�ecurit�e informatique |
General subdivision | Gestion. |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COMPUTERS |
General subdivision | Security |
-- | General. |
Source of heading or term | bisacsh |
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security |
General subdivision | Management |
Source of heading or term | fast |
758 ## - RESOURCE IDENTIFIER | |
Relationship information | has work: |
Label | Cyber breach response that actually works (Work) |
Real World Object URI | https://id.oclc.org/worldcat/entity/E39PCXhd8GtcwXhtKcVFKwYbHP |
Relationship | https://id.oclc.org/worldcat/ontology/hasWork |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | Gorecki, Andrew. |
Title | Cyber Breach Response That Actually Works : Organizational Approach to Managing Residual Risk. |
Place, publisher, and date of publication | Newark : John Wiley & Sons, Incorporated, �2020 |
International Standard Book Number | 9781119679325 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349">https://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349</a> |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH36884300 |
938 ## - | |
-- | Askews and Holts Library Services |
-- | ASKH |
-- | AH36884299 |
938 ## - | |
-- | ProQuest Ebook Central |
-- | EBLB |
-- | EBL6225840 |
938 ## - | |
-- | Recorded Books, LLC |
-- | RECE |
-- | rbeEB00831155 |
938 ## - | |
-- | YBP Library Services |
-- | YANK |
-- | 301328845 |
994 ## - | |
-- | 92 |
-- | INLUM |
No items available.