• Complain

Bollinger Jeff - Crafting the infosec playbook [security monitoring and incident response master plan]

Here you can read online Bollinger Jeff - Crafting the infosec playbook [security monitoring and incident response master plan] full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Beijing, year: 2015, publisher: OReilly Media, Inc., genre: Home and family. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Bollinger Jeff Crafting the infosec playbook [security monitoring and incident response master plan]

Crafting the infosec playbook [security monitoring and incident response master plan]: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Crafting the infosec playbook [security monitoring and incident response master plan]" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. Youll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Ciscos Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.

Bollinger Jeff: author's other books


Who wrote Crafting the infosec playbook [security monitoring and incident response master plan]? Find out the surname, the name of the author of the book and a list of all author's works by series.

Crafting the infosec playbook [security monitoring and incident response master plan] — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Crafting the infosec playbook [security monitoring and incident response master plan]" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Crafting the InfoSec Playbook

by Jeff Bollinger , Brandon Enright , and Matthew Valites

Copyright 2015 Jeff Bollinger, Brandon Enright, and Matthew Valites. All rights reserved.

Printed in the United States of America.

Published by OReilly Media, Inc. , 1005 Gravenstein Highway North, Sebastopol, CA 95472.

OReilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://safaribooksonline.com). For more information, contact our corporate/institutional sales department: 800-998-9938 or corporate@oreilly.com .

  • Editors: Mike Loukides, Katie Schooling,
    and Amy Jollymore
  • Production Editor: Kristen Brown
  • Copyeditor: Jasmine Kwityn
  • Proofreader: Marta Justak
  • Indexer: Wendy Catalano
  • Interior Designer: David Futato
  • Cover Designer: Karen Montgomery
  • Illustrator: Rebecca Demarest
  • June 2015: First Edition
Revision History for the First Edition
  • 2015-05-06: First Release

See http://oreilly.com/catalog/errata.csp?isbn=9781491949405 for release details.

The OReilly logo is a registered trademark of OReilly Media, Inc. Crafting the InfoSec Playbook, the cover image of an American crocodile, and related trade dress are trademarks of OReilly Media, Inc.

While the publisher and the authors have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the authors disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.

978-1-491-94940-5

[LSI]

Foreword

Over the past decade, Ciscos Computer Security Incident Response Team (CSIRT) has participated in countless customer meetings where we sat down and explained how we had protected one of the most attacked and interconnected companies in the world. As we reviewed the tools, people, and process for protecting large organizations, the playbook featured heavily. At the end of each one of these sessions, the group we were sharing with always asked, Can I have a copy of this playbook? We initially distributed some early sanitized versionsbut soon it got too big, too company specific, and too full of things that were impossible to sanitize to share. Now, with this book, we can finally answer yes, you can!

When I started the Cisco CSIRT at the beginning of this century, I had always hoped we could do something that had more relevance than protecting one company. Cisco has benefited from the interconnectivity it has provided, and I felt we had a responsibility to use some of those resources to help protect the same people we had connected. More specifically, I wanted to help groups that may not be able to afford a large CSIRT. Cisco has been very supportive of the teams efforts to share cybersecurity information and has provided resources and time to allow us to realize my hope.

At the time this book was written in 2014, the world witnessed a cataclysmic failure of cybersecurity efforts across the board, with large organizations seemingly hacked at will. Extremely damaging hacks to large retailers, entertainment companies, restaurant chains, and hundreds of others have ushered in the end of reliance on automated incident detection tools like security information and event management (SIEM) systems .

The Cisco CSIRT was at the forefront of the idea that people, not tools, were the answer to protecting organizations. This book details what some of the smartest people in this field have done to detect, identify, isolate, and mitigate cyber security threats. It started simply enoughif we had an incident that we didnt detect, we would look and see if there was any commonality about the attack that we could detect with normally available detection tools (intrusion detection systems, packet capture, logs, etc.). If there was, we would string together a detection method, or play, to look for it. If the play was useful, we would keep it. If not, we would drop it. Then it would eventually be added to the daily work of our security operations center. So the body of work this book represents was baked in the crucible of ongoing attacks and response over a very busy decade.

I am more proud of the work that this team has done than anything else in my professional career. I am really excited they took the time and effort to share the work at this level and depth. The information provided here can be used as a baseline for both new and old teams facing similar challenges. I hope that sharing like this can signal another watershed in the history of cybersecuritywhen the good guys started hitting back.

Gavin Reid
Vice President of Threat Intelligence
Lancope

Preface

If you are reading this, chances are you are looking to enhance your threat detection capabilities and techniques, and up your game as an InfoSec, incident response, and network defender or manager. Threats both in scale, complexity, and profile have evolved dramatically over the last several years and continue to increase. Proper detection and response require a lot more effort and sophistication to remain effective. Building, maturing, and maintaining an effective incident response team is no easy task. We have talked with hundreds of security teams of all types and sizes who are waging the same war between the attackers and their organizations networks, users, and information. Few have done it well, but with a solid strategy, the right expertise, and the right infrastructure, you can compete with the bad guys.

Any good attacker will tell youyour expensive security monitoring and prevention tools are not enough to keep you secure. Successful computer security incident response teams (CSIRTs) realize that intrusions are inevitable, and the best plan is a combination of cultivated threat intelligence, vigilant monitoring for early detection, and rapid and thorough response. Having the right data available in the right tools doesnt mean that the right people are looking at it and responding properly. Operational experience is invaluable and cannot be replaced by a magic black box or a single threat feed.

Our strategy focuses on collecting, organizing, mining, enhancing, and analyzing as many relevant data sources as possible in the hunt for intrusions and security breaches. We call our strategy, this bundle of detection and response methods, the playbook. We have developed a fundamental approach to building a successful incident response program that will detect the inevitable security incidents, minimize damage, yield enough information to share with the incident response community, and prevent successful attacks from recurring.

This book demonstrates how to boil down complex security monitoring, incident response, and threat analysis ideas into their most basic elements. Using a data-centric approach, we share how to create or refine your own unique incident detection strategy, how to keep your ideas and methods fresh, how to discover and develop your own threat intelligence, and how to compete against the malicious actors already attacking your network.

Should You Read This Book?

This book is for IT and information security (InfoSec) professionals, particularly incident or emergency response teams, InfoSec managers or directors, and IT architects, who want to either develop a nascent security monitoring and incident response program or evolve their existing program to a modern, more effective approach.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Crafting the infosec playbook [security monitoring and incident response master plan]»

Look at similar books to Crafting the infosec playbook [security monitoring and incident response master plan]. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Crafting the infosec playbook [security monitoring and incident response master plan]»

Discussion, reviews of the book Crafting the infosec playbook [security monitoring and incident response master plan] and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.