Book description
Learn how to build a Security Incident Response team with guidance from a leading SIRT from Cisco
Gain insight into the best practices of one of the foremost incident response teams
Master your plan for building a SIRT (Security Incidence Response Team) with detailed guidelines and expert advice for incident handling and response
Review legal issues from a variety of national perspectives, and consider practical aspects of coordination with other organizations
Network Security Incident Response provides practical guidelines for building an SIRT team as well offering advice on responding to actual incidents. For many companies, incident response is new territory. Some companies do not have an incidence response team at all. Some would like to have one but need guidance to start and others would like to improve existing practices. Today, there are only a handful of organizations that do have mature and experienced teams. For that reason this book is structured to provide help in both creating and running an effective Security Incident Response Team. Organizations who are evaluating whether to invest in a SIRT or who are just getting started building one will find the information in this book to be invaluable in helping them understand the nature of the threats, justifying resources, and building effective IR (Incidence Response) teams. Established IR teams will also benefit from the best practices highlighted in building IR teams as well as information on the current state of incident response handling, incident coordination, and legal issues. Written by a leading SIRT (Security Incident Response Team) from Cisco, the expertise and guidance provided in this book will serve as the blueprint for successful incidence response planning for most any organization.
Table of contents
- Title Page
- Copyright Page
- Contents at a Glance
- Contents
- About the Author
- About the Contributing Author
- About the Technical Reviewers
- Dedication
- Acknowledgments
- Introduction
- Part I. Computer Security Incidents
-
Part II. Product Security
- Chapter 7. Product Security Vulnerabilities
- Chapter 8. Creating a Product Security Team
- Chapter 9. Operating a Product Security Team
- Chapter 10. Actors in Vulnerability Handling
- Chapter 11. Security Vulnerability Handling by Vendors
- Chapter 12. Security Vulnerability Notification
- Chapter 13. Vulnerability Coordination
- Index
- Footnotes
Product information
- Title: Computer Incident Response and Product Security
- Author(s):
- Release date: December 2010
- Publisher(s): Cisco Press
- ISBN: 9780132491518
You might also like
book
Security Operations Center: Building, Operating and Maintaining your SOC
This is the Rough Cut version of the printed book. This is the first complete guide …
video
CISSP, Second Edition
Duration Almost 26 hours of deep-dive training covering every objective in the latest (ISC)2 CISSP exam. …
book
Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques About This Book …
book
Cybersecurity Blue Team Toolkit
A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data …