Table of Contents
Preface
Part 1: Attack on BigCo
1
The Attack on BigCo
BigCo – the attack
BigCo – cross-team co-ordination
BigCo – recovery
BigCo – the anatomy of an attack
Summary
Part 2: Security Resilience: Getting the Basics Down
2
Identity and Access Management
Two-factor authentication and why you need it
Something you know
Something you are
Something you have
Password complexity and NIST 800-63-3B
Application security
Password manager
Quick reference
Summary
3
Security Policies
Where are your policies, and are they being used?
Compliance begins with laws and regulations
Nortel hack
Importance of Due diligence
Summary
4
Security and Risk Management
What is risk management?
Identifying risks
Risk assessment
Monitoring your controls
Key ...
Get A CISO Guide to Cyber Resilience now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.