Part 2: Controlling the Fray
In this part of the book, we will look into the controls that can be implemented by the blue team to protect assets in its organization. Moreover, we will also review how these controls can be augmented by Cyber Threat Intelligence, and how the blue team could improve the efficacy of its controls.
This part of the book comprises the following chapters:
- Chapter 7, Preventive Controls
- Chapter 8, Detective Controls
- Chapter 9, Cyber Threat Intelligence
- Chapter 10, Incident Response and Recovery
- Chapter 11, Prioritizing and Implementing a Blue Team Strategy
What are security controls?
Security controls play an important role in shaping the actions taken by cybersecurity professionals to protect an organization. A lack ...
Get Cybersecurity Blue Team Strategies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.