000 07588cam a2200661 a 4500
001 on1159165163
003 OCoLC
005 20240523125542.0
006 m o d
007 cr un|---aucuu
008 200620s2020 inu o 001 0 eng d
040 _aEBLCP
_beng
_epn
_cEBLCP
_dDG1
_dUKAHL
_dOCLCF
_dYDX
_dRECBK
_dOCLCQ
_dOCLCO
_dK6U
_dOCLCO
_dOCLCQ
_dOCLCO
_dSFB
_dIEEEE
_dOCLCQ
_dUPM
_dOCLCQ
_dOCLCO
_dOCLCL
020 _a9781119679349
_q(electronic bk. ;
_qoBook)
020 _a1119679346
_q(electronic bk. ;
_qoBook)
020 _a9781119679318
020 _a1119679311
020 _a9781119679356
_q(electronic bk.)
020 _a1119679354
_q(electronic bk.)
024 7 _a10.1002/9781119679349
_2doi
029 1 _aAU@
_b000067555882
029 1 _aCHNEW
_b001087404
029 1 _aCHVBK
_b598948120
035 _a(OCoLC)1159165163
037 _a9820878
_bIEEE
050 4 _aQA76.9.A25
082 0 4 _a005.8
_223
049 _aMAIN
100 1 _aGorecki, Andrew.
245 1 0 _aCyber breach response that actually works :
_borganizational approach to managing residual risk /
_cAndrew Gorecki.
260 _aIndianapolis :
_bWiley,
_c2020.
300 _a1 online resource (323 pages)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
588 0 _aPrint version record.
505 0 _aCover -- Title Page -- Copyright Page -- About the Author -- About the Technical Editors -- Acknowledgments -- Contents at a Glance -- Contents -- Foreword -- Introduction -- Who Should Read This Book -- How This Book Is Organized -- How to Contact Wiley or the Author -- Notes -- Chapter 1 Understanding the Bigger Picture -- Evolving Threat Landscape -- Identifying Threat Actors -- Cyberattack Lifecycle -- Defining Cyber Breach Response -- Events, Alerts, Observations, Incidents, and Breaches -- What Is Cyber Breach Response? -- Identifying Drivers for Cyber Breach Response -- Risk Management
505 8 _aCyber Threat Intelligence -- Laws and Regulations -- Changing Business Objectives -- Incorporating Cyber Breach Response into a Cybersecurity Program -- Strategic Planning -- Designing a Program -- Implementing Program Components -- Program Operations -- Continual Improvement -- Strategy Development -- Strategic Assessment -- Strategy Definition -- Strategy Execution -- Roadmap Development -- Governance -- Establishing Policies -- Identifying Key Stakeholders -- Business Alignment -- Continual Improvement -- Summary -- Notes -- Chapter 2 Building a Cybersecurity Incident Response Team
505 8 _aDefining a CSIRT -- CSIRT History -- Defining Incident Response Competencies and Functions -- Proactive Functions -- Reactive Functions -- Creating an Incident Response Team -- Creating an Incident Response Mission Statement -- Choosing a Team Model -- Organizing an Incident Response Team -- Hiring and Training Personnel -- Establishing Authority -- Introducing an Incident Response Team to the Enterprise -- Enacting a CSIRT -- Defining a Coordination Model -- Communication Flow -- Assigning Roles and Responsibilities -- Business Functions -- Legal and Compliance
505 8 _aInformation Technology Functions -- Senior Management -- Working with Outsourcing Partners -- Outsourcing Considerations -- Establishing Successful Relationships with Vendors -- Summary -- Notes -- Chapter 3 Technology Considerations in Cyber Breach Investigations -- Sourcing Technology -- Comparing Commercial vs. Open Source Tools -- Developing In-House Software Tools -- Procuring Hardware -- Acquiring Forensic Data -- Forensic Acquisition -- Live Response -- Incident Response Investigations in Virtualized Environments -- Traditional Virtualization -- Cloud Computing
505 8 _aLeveraging Network Data in Investigations -- Identifying Forensic Evidence in Enterprise Technology Services -- Domain Name System -- Dynamic Host Configuration Protocol -- Web Servers -- Databases -- Security Tools -- Log Management -- What Is Logging? -- What Is Log Management? -- Log Management Lifecycle -- Collection and Storage -- Managing Logs with a SIEM -- Summary -- Notes -- Chapter 4 Crafting an Incident Response Plan -- Incident Response Lifecycle -- Preparing for an Incident -- Detecting and Analyzing Incidents -- Containment, Eradication, and Recovery -- Post-Incident Activities
500 _aUnderstanding Incident Management
500 _aIncludes index.
520 _aYou will be breached'the only question is whether you'll be ready'''' A cyber breach could cost your organization millions of dollars'in 2019, the average cost of a cyber breach for companies was $3.9M, a figure that is increasing 20-30% annually. But effective planning can lessen the impact and duration of an inevitable cyberattack. Cyber Breach Response That Actually Works provides a business-focused methodology that will allow you to address the aftermath of a cyber breach and reduce its impact to your enterprise. This book goes beyond step-by-step instructions for technical staff, focusing on big-picture planning and strategy that makes the most business impact. Inside, you'll learn what drives cyber incident response and how to build effective incident response capabilities. Expert author Andrew Gorecki delivers a vendor-agnostic approach based on his experience with Fortune 500 organizations.-Understand the evolving threat landscape and learn how to address tactical and strategic challenges to build a comprehensive and cohesive cyber breach response program -Discover how incident response fits within your overall information security program, including a look at risk management -Build a capable incident response team and create an actionable incident response plan to prepare for cyberattacks and minimize their impact to your organization -Effectively investigate small and large-scale incidents and recover faster by leveraging proven industry practices -Navigate legal issues impacting incident response, including laws and regulations, criminal cases and civil litigation, and types of evidence and their admissibility in court In addition to its valuable breadth of discussion on incident response from a business strategy perspective, Cyber Breach Response That Actually Works offers information on key technology considerations to aid you in building an effective capability and accelerating investigations to ensure your organization can continue business operations during significant cyber events.
590 _aJohn Wiley and Sons
_bWiley Online Library: Complete oBooks
650 0 _aComputer security
_xManagement.
650 6 _aS�ecurit�e informatique
_xGestion.
650 7 _aCOMPUTERS
_xSecurity
_xGeneral.
_2bisacsh
650 7 _aComputer security
_xManagement
_2fast
758 _ihas work:
_aCyber breach response that actually works (Work)
_1https://id.oclc.org/worldcat/entity/E39PCXhd8GtcwXhtKcVFKwYbHP
_4https://id.oclc.org/worldcat/ontology/hasWork
776 0 8 _iPrint version:
_aGorecki, Andrew.
_tCyber Breach Response That Actually Works : Organizational Approach to Managing Residual Risk.
_dNewark : John Wiley & Sons, Incorporated, �2020
_z9781119679325
856 4 0 _uhttps://onlinelibrary.wiley.com/doi/book/10.1002/9781119679349
938 _aAskews and Holts Library Services
_bASKH
_nAH36884300
938 _aAskews and Holts Library Services
_bASKH
_nAH36884299
938 _aProQuest Ebook Central
_bEBLB
_nEBL6225840
938 _aRecorded Books, LLC
_bRECE
_nrbeEB00831155
938 _aYBP Library Services
_bYANK
_n301328845
994 _a92
_bINLUM
999 _c12714
_d12714