9781484238691-1484238699-Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents

ISBN-13: 9781484238691
ISBN-10: 1484238699
Edition: 1st ed.
Author: Eric C. Thompson
Publication date: 2018
Publisher: Apress
Format: Paperback 191 pages
FREE US shipping
Buy

From $16.50

Book details

ISBN-13: 9781484238691
ISBN-10: 1484238699
Edition: 1st ed.
Author: Eric C. Thompson
Publication date: 2018
Publisher: Apress
Format: Paperback 191 pages

Summary

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents (ISBN-13: 9781484238691 and ISBN-10: 1484238699), written by authors Eric C. Thompson, was published by Apress in 2018. With an overall rating of 4.0 stars, it's a notable title among other Network Security (Security & Encryption, Networking & Cloud Computing) books. You can easily purchase or rent Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents (Paperback) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.98.

Description

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.

The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include:

  • Planning and practicing
  • Detection
  • Containment
  • Eradication
  • Post-incident actions

What You'll Learn

  • Know the sub-categories of the NIST Cybersecurity Framework
  • Understand the components of incident response
  • Go beyond the incident response plan
  • Turn the plan into a program that needs vision, leadership, and culture to make it successful
  • Be effective in your role on the incident response team

Who This Book Is For

Cybersecurity leaders, executives, consultants, and entry-level professionals responsible for executing the incident response plan when something goes wrong

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book