• Complain

Hinne Hettema - Agile Security Operations: Engineering for agility in cyber defense, detection, and response

Here you can read online Hinne Hettema - Agile Security Operations: Engineering for agility in cyber defense, detection, and response full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Packt Publishing, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Hinne Hettema Agile Security Operations: Engineering for agility in cyber defense, detection, and response
  • Book:
    Agile Security Operations: Engineering for agility in cyber defense, detection, and response
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2022
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Agile Security Operations: Engineering for agility in cyber defense, detection, and response: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Agile Security Operations: Engineering for agility in cyber defense, detection, and response" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile threat intelligence

Key Features
  • Explore robust and predictable security operations based on measurable service performance
  • Learn how to improve the security posture and work on security audits
  • Discover ways to integrate agile security operations into development and operations
Book Description

Agile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best.

Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. Youll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, youll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding.

By the end of this Agile book, youll be ready to start implementing agile security operations, using the book as a handy reference.

What you will learn
  • Get acquainted with the changing landscape of security operations
  • Understand how to sense an attackers motives and capabilities
  • Grasp key concepts of the kill chain, the ATT&CK framework, and the Cynefin framework
  • Get to grips with designing and developing a defensible security architecture
  • Explore detection and response engineering
  • Overcome challenges in measuring the security posture
  • Derive and communicate business values through security operations
  • Discover ways to implement security as part of development and business operations
Who this book is for

This book is for new and established CSOC managers as well as CISO, CDO, and CIO-level decision-makers. If you work as a cybersecurity engineer or analyst, youll find this book useful. Intermediate-level knowledge of incident response, cybersecurity, and threat intelligence is necessary to get started with the book.

Table of Contents
  1. How Security Operations Are Changing
  2. Incident Response - A Key Capability in Security Operations
  3. Engineering for Incident Response
  4. Key Concepts in Cyber Defense
  5. Defensible Architecture
  6. Active Defense
  7. How Secure are You? - Measuring Security Posture
  8. Red, Blue and Purple Teaming
  9. Running and Operating Security Services
  10. Implementing Agile Threat Intelligence

Hinne Hettema: author's other books


Who wrote Agile Security Operations: Engineering for agility in cyber defense, detection, and response? Find out the surname, the name of the author of the book and a list of all author's works by series.

Agile Security Operations: Engineering for agility in cyber defense, detection, and response — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Agile Security Operations: Engineering for agility in cyber defense, detection, and response" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Agile Security Operations Engineering for agility in cyber defense detection - photo 1
Agile Security Operations

Engineering for agility in cyber defense, detection, and response

Hinne Hettema

BIRMINGHAMMUMBAI Agile Security Operations Copyright 2022 Packt Publishing All - photo 2

BIRMINGHAMMUMBAI

Agile Security Operations

Copyright 2022 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Group Product Manager: Wilson Dsouza

Publishing Product Manager: Vijin Boricha

Senior Editor: Arun Nadar

Content Development Editor: Sulagna Mohanty

Technical Editor: Arjun Varma

Copy Editor: Safis Editing

Project Coordinator: Shagun Saini

Proofreader: Safis Editing

Indexer: Subalakshmi Govindhan

Production Designer: Jyoti Chauhan

First published: February 2022

Production reference: 1141221

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

ISBN 978-1-80181-551-2

www.packt.com

To all my teachers on the path.

Hinne Hettema

Contributors
About the author

Hinne Hettema is a practitioner in cybersecurity operations, focusing especially on enabling security capabilities through detection engineering, security monitoring, threat intelligence, incident response, operational technology, and malware research. He works in New Zealand in security operations and the establishment of cybersecurity defensive capabilities in various organizations. He is an adjunct senior fellow at the University of Queensland, researching cybersecurity operations, the security of operational technology, and the philosophy of cybersecurity. He studied theoretical chemistry and philosophy.

About the reviewers

Rene Thorup holds an MSc degree in forensic computing with distinction and a Dean's award from Coventry University and an academic profession degree in IT networks and electronics technology. He has over 20 years' experience within cybersecurity, from cybersecurity analyst to CISO, and he has even been a university lecturer and cybersecurity trainer for a leading incident response company. Rene has built, and led, several SOC and SecOps teams from scratch over the years, both for the military/governments and large enterprises. Recently, he was the technical lead for EMEA and APAC for a well-known cybersecurity firm, and conducted incident response and root cause analysis on several high-profile cyber-attacks.

I would like to thank the professional leaders that always believed in me and my abilities to succeed and supported my continuous development especially "PT" and "MF" from the Danish Defense. Also, a big thanks to "Lex," who was a great inspiration for keeping up the hard study on my MSc, and made it fun to study.

Beshoy A. Iskander holds two MSc degrees in cybersecurity and technology management and holds other professional certifications in cyber security and incident response, with 15 years of experience in cyber security across multiple security vendors, such as RSA and other firms in the FinTech industry.

Currently, Beshoy is the director of cyber security operations for a multinational crypto-currency company.

I would like to thank God first, for his grace, which led me to this point in my life. I'd also like to thank my wife, Lidia; my first son, Jonathan; my second child to be; and my mother. I'd also love to dedicate my contribution to this book to the soul of my father.

Table of Contents
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Agile Security Operations: Engineering for agility in cyber defense, detection, and response»

Look at similar books to Agile Security Operations: Engineering for agility in cyber defense, detection, and response. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Agile Security Operations: Engineering for agility in cyber defense, detection, and response»

Discussion, reviews of the book Agile Security Operations: Engineering for agility in cyber defense, detection, and response and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.