• Complain

Roberto Martinez - Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting

Here you can read online Roberto Martinez - Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2022, publisher: Packt Publishing, genre: Romance novel. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Roberto Martinez Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting
  • Book:
    Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting
  • Author:
  • Publisher:
    Packt Publishing
  • Genre:
  • Year:
    2022
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using threat intelligence

Key Features
  • Understand best practices for detecting, containing, and recovering from modern cyber threats
  • Get practical experience embracing incident response using intelligence-based threat hunting techniques
  • Implement and orchestrate different incident response, monitoring, intelligence, and investigation platforms
Book Description

With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization.

Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, youll cover the different aspects of developing an incident response program. Youll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. Youll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules.

By the end of this book, youll have learned everything you need to respond to cybersecurity incidents using threat intelligence.

What you will learn
  • Explore the fundamentals of incident response and incident management
  • Find out how to develop incident response capabilities
  • Understand the development of incident response plans and playbooks
  • Align incident response procedures with business continuity
  • Identify incident response requirements and orchestrate people, processes, and technologies
  • Discover methodologies and tools to integrate cyber threat intelligence and threat hunting into incident response
Who this book is for

If you are an information security professional or anyone who wants to learn the principles of incident management, first response, threat hunting, and threat intelligence using a variety of platforms and tools, this book is for you. Although not necessary, basic knowledge of Linux, Windows internals, and network protocols will be helpful.

Table of Contents
  1. Threat Landscape and Cybersecurity Incidents
  2. Concepts of Digital Forensics and Incident Response
  3. Basics of the Incident Response and Triage Procedures
  4. Applying First Response Procedures
  5. Identifying and Profiling Threat Actors
  6. Understanding the Cyber Kill Chain and the MITRE ATT&CK Framework
  7. Using Cyber Threat Intelligence in Incident Response
  8. Building an Incident Response Capability
  9. Creating Incident Response Plans and Playbooks
  10. Implementing an Incident Management System
  11. Integrating SOAR Capabilities into Incident Response
  12. Working with Analytics and Detection Engineering in Incident Response
  13. Creating and Deploying Detection Rules
  14. Hunting and Investigating Security Incidents

Roberto Martinez: author's other books


Who wrote Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting? Find out the surname, the name of the author of the book and a list of all author's works by series.

Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Incident Response with Threat Intelligence Practical insights into developing - photo 1
Incident Response with Threat Intelligence

Practical insights into developing an incident response capability through intelligence-based threat hunting

Roberto Martnez

BIRMINGHAMMUMBAI Incident Response with Threat Intelligence Copyright 2022 - photo 2

BIRMINGHAMMUMBAI

Incident Response with Threat Intelligence

Copyright 2022 Packt Publishing

All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews.

Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the author, nor Packt Publishing or its dealers and distributors, will be held liable for any damages caused or alleged to have been caused directly or indirectly by this book.

Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information.

Group Product Manager: Vijin Boricha

Publishing Product Manager: Vijin Boricha

Senior Editor: Arun Nadar

Content Development Editor: Romy Dias

Technical Editor: Shruthi Shetty

Copy Editor: Safis Editing

Project Coordinator: Ajesh Devavaram

Proofreader: Safis Editing

Indexer: Subalakshmi Govindan

Production Designer: Alishon Mendonca

Marketing Coordinator: Sanjana Gupta

First published: May 2022

Production reference: 1180522

Published by Packt Publishing Ltd.

Livery Place

35 Livery Street

Birmingham

B3 2PB, UK.

ISBN 978-1-80107-295-3

www.packt.com

Dedicated to those who showed me the way with their love and example and taught me never to give up.

Contributors
About the author

Roberto Martnez (@r0bertmart1nez) has worked as senior security researcher at Kaspersky's Global Research and Analysis Team (GReAT) and as Watch Commander at HSBC (GCO), investigating cyberthreats, responding to security incidents, and presenting at security events worldwide.

He has collaborated as an expert associate professor at Tecnolgico de Monterrey (ITESM) and is a member of the High Technology Crime Investigation Association (HTCIA).

Roberto has more than 18 years of experience in cybersecurity fields such as offensive security, malware analysis, digital forensics, incident response, threat intelligence, and threat hunting.

He also worked as a security consultant and instructor for governments, financial institutions, and private corporations in Latin America.

I thank God; my wonderful wife, Claudia; my beloved children, Ale, Luis, Robert; my family; friends; and the loved ones who always supported me in all those endless hours on nights and weekends when I was not with them to dedicate myself to writing this book.

Special thanks to my friend Andrs Velzquez, who I esteem and admire for his outstanding professional career and agreeing to be the presenter at the book's launch.

I also thank the whole Packt team, especially Vijin Boricha, Romy Dias, Ajesh Devavaran, Vaidehi Sawant, and Troy Mitchell, for their valuable support and patience in helping me improve and make this book a reality.

About the reviewer

Troy Mitchell is a cybersecurity professional with three decades of experience in information technology and cybersecurity, both on the defensive and offensive sides.

His expertise is mainly in incident response, digital forensics, malware analysis, threat hunting, penetration testing, and threat intelligence.

Troy retains many professional certifications, including Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), VMware VCP, and MCSE: Security.

He has worked for private sector companies as well as several government agencies.

He is currently a senior cybersecurity engineer with a global engineering company.

Troy is a highly active member of the cybersecurity community, along with playing in Capture the Flag (CTF) events.

I'd like to thank Packt Publishing for the opportunity to be selected as a technical reviewer to review and contribute to this book.

I would also like to thank my wife and daughter for supporting me as I worked on reviewing this book after work and on weekends, accompanied by my sidekick Skittles, the tabby cat.

Table of Contents
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting»

Look at similar books to Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting»

Discussion, reviews of the book Incident Response with Threat Intelligence: Practical insights into developing an incident response capability through intelligence-based threat hunting and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.