Chapter 11: Security Management Techniques

As you have discovered thus far, there are many elements that need to work together in improving the security posture of enterprise networks and the organization as a whole. During the course of this book, you have learned about the principles and importance of implementing a Defense-in-Depth (DiD) approach to defend against the latest cyberattacks and threats. One such element that is commonly overlooked and sometimes forgotten in the industry is the need to implement policies, procedures, and guidelines for managing assets, configuring mobile and portable computing devices, and maintaining patch levels and vulnerabilities within the organization.

While many organizations work continuously to ensure ...

Get Cisco Certified CyberOps Associate 200-201 Certification Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.