• Complain

Aaron Roberts - The No-Nonsense Guide for CISOs and Security Managers

Here you can read online Aaron Roberts - The No-Nonsense Guide for CISOs and Security Managers full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Apress, genre: Business. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Aaron Roberts The No-Nonsense Guide for CISOs and Security Managers
  • Book:
    The No-Nonsense Guide for CISOs and Security Managers
  • Author:
  • Publisher:
    Apress
  • Genre:
  • Year:
    2021
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

The No-Nonsense Guide for CISOs and Security Managers: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "The No-Nonsense Guide for CISOs and Security Managers" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Aaron Roberts: author's other books


Who wrote The No-Nonsense Guide for CISOs and Security Managers? Find out the surname, the name of the author of the book and a list of all author's works by series.

The No-Nonsense Guide for CISOs and Security Managers — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The No-Nonsense Guide for CISOs and Security Managers" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Contents
Landmarks
Book cover of Cyber Threat Intelligence Aaron Roberts Cyber Threat - photo 1
Book cover of Cyber Threat Intelligence
Aaron Roberts
Cyber Threat Intelligence
The No-Nonsense Guide for CISOs and Security Managers
1st ed.
Logo of the publisher Aaron Roberts London UK ISBN 978-1-4842-7219-0 - photo 2
Logo of the publisher
Aaron Roberts
London, UK
ISBN 978-1-4842-7219-0 e-ISBN 978-1-4842-7220-6
https://doi.org/10.1007/978-1-4842-7220-6
Aaron Roberts 2021
This work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilms or in any other physical way, and transmission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, expressed or implied, with respect to the material contained herein or for any errors or omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This Apress imprint is published by the registered company APress Media, LLC part of Springer Nature.

The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.

For Berta. Thank you for supporting me on this journey and pushing me. This book wouldnt exist without you.

Introduction

Since the Internet became a regular fixture in everyday life in the 1990s, the threat from criminals utilizing this modern wonder of the world has grown exponentially. As the world has become more dependent on technology, the sophistication and reach of hackers, nation-states, and criminals continues to evolve at an unprecedented rate and an unprecedented scale.

I have always been fascinated by computers and technology. As a young child, I remember my Commodore 64 fondly. I grew up as a working-class lad and didnt own a proper computer until I was 18. However, from that moment, my interest and inquisitive nature took over. In 2009, after three years on and off in the Army Reserve, I embarked on my then newfound career working in IT and, subsequently, intelligence within the UK Civil Service. I worked in a variety of roles and locations and received some excellent training and foundations to specialize in the emerging field of cyber intelligence, which is something Im incredibly grateful for.

However, in 2017, my career evolved and moved away from working in the traditional areas of operation into primarily being solely focused on threats within cybersecurity. I spend my days working in cyber threat intelligence (CTI). Now, if that doesnt sound very long to you, Id like to identify that this is a very new industry that is still growing and coming to terms with what it actually is. However, Id like to highlight the credentials that will hopefully convince you that I have the relevant and appropriate experience to write this book that you may wish to consider:
  • Beyond the public sector, I have now worked for a CTI-specific start-up, a global telecommunications company, and the largest broadcast media company in Europe, in addition to opening my own cyber intelligence consultancy.

  • I spend my days focusing on the threats from cybercriminals and nation-state actors to my organization and our peers, what we should be considering, and how we stop them.

  • Im actively engaged within the community in London and maintain a presence in groups, networking events, and (now) regularly posting about things on social media and my website.

  • The skills I have picked up since 2009 have enabled me to become the principal intelligence analyst at my employer, and I continue to mentor junior analysts and find new tradecraft and improved ways of working. These skills have also allowed me to open my own business providing investigative support, consultancy, and training services.

Although I hope you find this book of value, and that it helps you in setting up or maintaining an excellent CTI program in your own business or, indeed, learning some of the core concepts around CTI as an analyst, I would urge you not to consider this book a one-stop shop for what or how you should adapt CTI within your organization.

I am one person who has some valuable experience and insight, but the needs of your organization may differ from my experiences. You likely operate in different geographies, use different technologies, and, due to the nature of your business, face different threats as a result. As such, you have a unique challenge in front of you, as every business is different. Some of the things that differ from business to business (B2B) would be as follows:
  • Do you use Windows as the corporate desktop? macOS? Linux?!

  • The hardware used to run your corporate system laptop, desktop, thick client, thin client, etc.

  • What cloud services are you using?

  • What Internet-facing services are already in place?

  • What security mechanisms does your organization already deploy for these systems?

  • What is your key business?

  • Who are the actors targeting you? Who have they already successfully compromised?

  • What systems are in place that you dont know about?

  • What geographies do you operate in?

  • What previous security incidents have you faced?

  • How big is the security team? What functions do they serve?

These are just a few questions that you should be asking yourself before considering a CTI program. After all, your threat profile is very different if youre Barclays Bank or if youre Peggys News on the high street in Skipton. This example may be crude, but it helps to illustrate that you need to adopt a unique response to your intelligence program and some of the reasons why. If you dont adopt a unique strategy within your own business, youre going to have gaps in your coverage and/or detection processes.

Something I strongly believe is that cybersecurity should always be intelligence-led. CTI gives you the reason why to adopt a specific approach. Without it, you just have information and response without context.

What This Book Isnt

This book is written almost like a manifesto for what CTI practices should be. It is not, however, a step-by-step guide on what you should do and how you should do it. There are a couple of reasons for this. Foremost, as I mentioned, every single organization has different requirements, different IT estates, and a unique threat model from every other organization, unique even from its own peers.

I cant in good conscience tell you what to do and know that it will work 100% of the time. Some of my suggestions will ring true for you; some of them wont. You may agree with me in some cases and wholeheartedly disagree with me elsewhere. However, I hope the overlying message conveyed within this book is something that you do agree with and therefore take into consideration when looking at broader practices, vendors, and approaches to security controls moving forward.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «The No-Nonsense Guide for CISOs and Security Managers»

Look at similar books to The No-Nonsense Guide for CISOs and Security Managers. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «The No-Nonsense Guide for CISOs and Security Managers»

Discussion, reviews of the book The No-Nonsense Guide for CISOs and Security Managers and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.