Aaron Roberts - The No-Nonsense Guide for CISOs and Security Managers
Here you can read online Aaron Roberts - The No-Nonsense Guide for CISOs and Security Managers full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Apress, genre: Business. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:
Romance novel
Science fiction
Adventure
Detective
Science
History
Home and family
Prose
Art
Politics
Computer
Non-fiction
Religion
Business
Children
Humor
Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.
- Book:The No-Nonsense Guide for CISOs and Security Managers
- Author:
- Publisher:Apress
- Genre:
- Year:2021
- Rating:5 / 5
- Favourites:Add to favourites
- Your mark:
- 100
- 1
- 2
- 3
- 4
- 5
The No-Nonsense Guide for CISOs and Security Managers: summary, description and annotation
We offer to read an annotation, description, summary or preface (depends on what the author of the book "The No-Nonsense Guide for CISOs and Security Managers" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.
The No-Nonsense Guide for CISOs and Security Managers — read online for free the complete book (whole text) full work
Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "The No-Nonsense Guide for CISOs and Security Managers" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.
Font size:
Interval:
Bookmark:
![Book cover of Cyber Threat Intelligence Aaron Roberts Cyber Threat - photo 1](/uploads/posts/book/272187/images/978-1-4842-7220-6_CoverFigure.jpg)
![Logo of the publisher Aaron Roberts London UK ISBN 978-1-4842-7219-0 - photo 2](/uploads/posts/book/272187/images/505542_1_En_BookFrontmatter_Figa_HTML.png)
This Apress imprint is published by the registered company APress Media, LLC part of Springer Nature.
The registered company address is: 1 New York Plaza, New York, NY 10004, U.S.A.
For Berta. Thank you for supporting me on this journey and pushing me. This book wouldnt exist without you.
Since the Internet became a regular fixture in everyday life in the 1990s, the threat from criminals utilizing this modern wonder of the world has grown exponentially. As the world has become more dependent on technology, the sophistication and reach of hackers, nation-states, and criminals continues to evolve at an unprecedented rate and an unprecedented scale.
I have always been fascinated by computers and technology. As a young child, I remember my Commodore 64 fondly. I grew up as a working-class lad and didnt own a proper computer until I was 18. However, from that moment, my interest and inquisitive nature took over. In 2009, after three years on and off in the Army Reserve, I embarked on my then newfound career working in IT and, subsequently, intelligence within the UK Civil Service. I worked in a variety of roles and locations and received some excellent training and foundations to specialize in the emerging field of cyber intelligence, which is something Im incredibly grateful for.
Beyond the public sector, I have now worked for a CTI-specific start-up, a global telecommunications company, and the largest broadcast media company in Europe, in addition to opening my own cyber intelligence consultancy.
I spend my days focusing on the threats from cybercriminals and nation-state actors to my organization and our peers, what we should be considering, and how we stop them.
Im actively engaged within the community in London and maintain a presence in groups, networking events, and (now) regularly posting about things on social media and my website.
The skills I have picked up since 2009 have enabled me to become the principal intelligence analyst at my employer, and I continue to mentor junior analysts and find new tradecraft and improved ways of working. These skills have also allowed me to open my own business providing investigative support, consultancy, and training services.
Although I hope you find this book of value, and that it helps you in setting up or maintaining an excellent CTI program in your own business or, indeed, learning some of the core concepts around CTI as an analyst, I would urge you not to consider this book a one-stop shop for what or how you should adapt CTI within your organization.
Do you use Windows as the corporate desktop? macOS? Linux?!
The hardware used to run your corporate system laptop, desktop, thick client, thin client, etc.
What cloud services are you using?
What Internet-facing services are already in place?
What security mechanisms does your organization already deploy for these systems?
What is your key business?
Who are the actors targeting you? Who have they already successfully compromised?
What systems are in place that you dont know about?
What geographies do you operate in?
What previous security incidents have you faced?
How big is the security team? What functions do they serve?
These are just a few questions that you should be asking yourself before considering a CTI program. After all, your threat profile is very different if youre Barclays Bank or if youre Peggys News on the high street in Skipton. This example may be crude, but it helps to illustrate that you need to adopt a unique response to your intelligence program and some of the reasons why. If you dont adopt a unique strategy within your own business, youre going to have gaps in your coverage and/or detection processes.
Something I strongly believe is that cybersecurity should always be intelligence-led. CTI gives you the reason why to adopt a specific approach. Without it, you just have information and response without context.
This book is written almost like a manifesto for what CTI practices should be. It is not, however, a step-by-step guide on what you should do and how you should do it. There are a couple of reasons for this. Foremost, as I mentioned, every single organization has different requirements, different IT estates, and a unique threat model from every other organization, unique even from its own peers.
I cant in good conscience tell you what to do and know that it will work 100% of the time. Some of my suggestions will ring true for you; some of them wont. You may agree with me in some cases and wholeheartedly disagree with me elsewhere. However, I hope the overlying message conveyed within this book is something that you do agree with and therefore take into consideration when looking at broader practices, vendors, and approaches to security controls moving forward.
Font size:
Interval:
Bookmark:
Similar books «The No-Nonsense Guide for CISOs and Security Managers»
Look at similar books to The No-Nonsense Guide for CISOs and Security Managers. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.
Discussion, reviews of the book The No-Nonsense Guide for CISOs and Security Managers and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.