• Complain

Chris Peiris - Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

Here you can read online Chris Peiris - Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2021, publisher: Wiley, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks
  • Author:
  • Publisher:
    Wiley
  • Genre:
  • Year:
    2021
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros

In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. Youll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors.

Youll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation.

With this book youll learn:

  • Key business and technical drivers of cybersecurity threat hunting frameworks in todays technological environment
  • Metrics available to assess threat hunting effectiveness regardless of an organizations size
  • How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations
  • A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks
  • Comprehensive AWS and Azure how to solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs)
  • Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration
  • Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies
  • Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers
  • The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices.

Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organizations cybersecurity risk framework and mitigation strategy.

Chris Peiris: author's other books


Who wrote Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks? Find out the surname, the name of the author of the book and a list of all author's works by series.

Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Table of Contents List of Tables Chapter 2 Chapter 6 List of - photo 1
Table of Contents
List of Tables
  1. Chapter 2
  2. Chapter 6
List of Illustrations
  1. Chapter 1
  2. Chapter 2
  3. Chapter 3
  4. Chapter 4
  5. Chapter 5
  6. Chapter 6
  7. Chapter 7
  8. Chapter 8
  9. Chapter 9
  10. Appendix G
Guide
Pages
Threat Hunting in the Cloud Defending AWS Azure and Other Cloud Platforms - photo 2
Threat Hunting in the Cloud
Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks

Chris Peiris

Binil Pillai

Abbas Kudrati

Copyright 2022 by John Wiley Sons Inc All rights reserved Published by - photo 3

Copyright 2022 by John Wiley & Sons, Inc. All rights reserved.

Published by John Wiley & Sons, Inc., Hoboken, New Jersey.

Published simultaneously in Canada.

ISBN: 978-1-119-80406-2
ISBN: 978-1-119-80411-6 (ebk)
ISBN: 978-1-119-80410-9 (ebk)

No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley.com/go/permission.

Limit of Liability/Disclaimer of Warranty: While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose. No warranty may be created or extended by sales representatives or written sales materials. The advice and strategies contained herein may not be suitable for your situation. You should consult with a professional where appropriate. Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages.

For general information on our other products and services or for technical support, please contact our Customer Care Department within the United States at (800) 762-2974, outside the United States at (317) 572-3993 or fax (317) 572-4002.

Wiley also publishes its books in a variety of electronic formats. Some content that appears in print may not be available in electronic formats. For more information about Wiley products, visit our web site at www.wiley.com.

Library of Congress Control Number: 2021944284

Trademarks: WILEY and the Wiley logo are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates, in the United States and other countries, and may not be used without written permission. AWS is a registered trademark of Amazon Technologies, Inc. and Azure is a registered trademark of Microsoft Corporation. All other trademarks are the property of their respective owners. John Wiley & Sons, Inc. is not associated with any product or vendor mentioned in this book.

Cover Image: bookzv/Shutterstock

Cover Design: Wiley

This book is dedicated to my mother, Shantha, and my father, Christopher, who taught me that hard work, passion, and curiosity will overcome any obstacle in life. Thank you for the support and courage you provided me to take on the worldand to my youngest son, Deven, who teaches me to venture out of my comfort zone and challenge the status quo every day. This is for you.

Dr. Chris Peiris

I dedicate this book to my dad, Capt. Aravindakshan Pillai, my mom, Ambika Devi, my sister, Beena Pradeep, and my school teachers, not only for their love and care but also for their support during my childhood socialization, which helped shape how I view the world around me and learn the importance of respecting others, regardless of their race, ethnicity, religion, gender, age, etc.

Binil Pillai

I dedicate this book to my dad, Shabbir Hussain, whom I role model in many ways, and to my mom, Zahra, who keeps me in her everyday prayers.

Abbas Kudrati

About the Authors
Dr Chris Peiriss information technology career spans over 25 years the last - photo 4

Dr. Chris Peiris's information technology career spans over 25 years, the last 15+ years dedicated to cybersecurity. Chris is an avid publisher and a thought leader in the cybersecurity, enterprise architecture, and cloud integration spaces. He has advised Fortune 500 companies, federal and state governments, and defense and intelligence entities across the U.S., Asia Pacific Japan, Middle East Africa, Australia, and New Zealand.

Chris is a published author of 10 books on multiple technologies, including cybersecurity, cloud computing, web services, C#, and Java topics. These books have been translated into nine languages and are available in 30+ countries. He is also an academic researcher at Monash University and University of Canberra. Chris was awarded an Associate Professorship (Adjunct) fellowship at the University of Canberra in recognition of academic research contributions to cybersecurity and cloud computing. He has multiple tertiary qualifications from Harvard University, the University of Canberra, and Monash University. He is an author of multiple academic research journals and frequent speaker at professional IT conferences.

Chris was the Director of Cybersecurity for Microsoft, Asia Pacific Japan, and Australia. He was also the National Security Lead for Avanade (Accenture and Microsoft joint venture) and an advisor to multiple defense and intelligence think tanks. Chris has assisted in creating government wide secure threat management frameworks in Taiwan, Singapore, New Zealand, and Australia. He also created incident response, security operations center/cyber fusion center, advisory services, and threat intelligence capabilities across Asia Pacific Japan, Middle East Africa, and Americas.

Binil Pillai is a strategic-thinking business development professional with 23 - photo 5

Binil Pillai is a strategic-thinking business development professional with 23 years of multifaceted experience building relationships, cultivating partnerships, retaining customers, and growing profit channels by establishing trust. As Global Director of Security, Compliance and Identity (SCI) at Microsoft, Binil focuses on the small, medium, and corporate segment and works with corporate executives to evangelize security as a foundational capability to accelerate a secure digital transformation journey. Binil has experience in security product development, managed security product marketing, and led worldwide security go-to-market and sales activations. He was the business architect who designed and launched the Business Value Analysis (BVA) model to quantify security risk exposure for B2B customers. Before joining Microsoft, Binil worked as a regional practice manager for Deloitte Consulting's strategy and operations practice. His business strategy consulting experience spans business transformation, corporate strategy alignment, post-merger integration, adoption and change management, customer relationship management, IT strategic planning, and more, with a wide range of companies and government agencies.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks»

Look at similar books to Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks»

Discussion, reviews of the book Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.