Book description
Learn how to build a Security Incident Response team with guidance from a leading SIRT from Cisco
Gain insight into the best practices of one of the foremost incident response teams
Master your plan for building a SIRT (Security Incidence Response Team) with detailed guidelines and expert advice for incident handling and response
Review legal issues from a variety of national perspectives, and consider practical aspects of coordination with other organizations
Network Security Incident Response provides practical guidelines for building an SIRT team as well offering advice on responding to actual incidents. For many companies, incident response is new territory. Some companies do not have an incidence response team at all. Some would like to have one but need guidance to start and others would like to improve existing practices. Today, there are only a handful of organizations that do have mature and experienced teams. For that reason this book is structured to provide help in both creating and running an effective Security Incident Response Team. Organizations who are evaluating whether to invest in a SIRT or who are just getting started building one will find the information in this book to be invaluable in helping them understand the nature of the threats, justifying resources, and building effective IR (Incidence Response) teams. Established IR teams will also benefit from the best practices highlighted in building IR teams as well as information on the current state of incident response handling, incident coordination, and legal issues. Written by a leading SIRT (Security Incident Response Team) from Cisco, the expertise and guidance provided in this book will serve as the blueprint for successful incidence response planning for most any organization.
Table of contents
- Title Page
- Copyright Page
- Contents at a Glance
- Contents
- About the Author
- About the Contributing Author
- About the Technical Reviewers
- Dedication
- Acknowledgments
- Introduction
- Part I. Computer Security Incidents
-
Part II. Product Security
- Chapter 7. Product Security Vulnerabilities
- Chapter 8. Creating a Product Security Team
- Chapter 9. Operating a Product Security Team
- Chapter 10. Actors in Vulnerability Handling
- Chapter 11. Security Vulnerability Handling by Vendors
- Chapter 12. Security Vulnerability Notification
- Chapter 13. Vulnerability Coordination
- Index
- Footnotes
Product information
- Title: Computer Incident Response and Product Security
- Author(s):
- Release date: December 2010
- Publisher(s): Cisco Press
- ISBN: 9780132491518
You might also like
book
The Cybersecurity Playbook for Modern Enterprises
Learn how to build a cybersecurity program for a changing world with the help of proven …
book
Cybersecurity Risk Management
Cybersecurity Risk Management In Cybersecurity Risk Management: Mastering the Fundamentals Using the NIST Cybersecurity Framework, veteran …
book
Infosec Strategies and Best Practices
Advance your career as an information security professional by turning theory into robust solutions to secure …
book
Cybersecurity and Third-Party Risk
STRENGTHEN THE WEAKEST LINKS IN YOUR CYBERSECURITY CHAIN Across the world, the networks of hundreds of …