Table of Contents
Contributors
Preface
Part 1: Establishing the Blue
1
Establishing a Defense Program
How do organizations benefit from implementing the blue teaming approach?
Risk assessment
Monitoring and surveillance
Security controls
Reporting and recommendation to management
A blue team’s composition
Analysts
Incident responder
Threat hunter
Security consultant
Security administrator
Identity and Access Management (IAM) administrator
Compliance analyst
Red team
Purple team
Cyber threat intelligence
Skills required to be in a blue team
Eager to learn and detail-oriented
In-depth knowledge of networks and systems
Outside-the-box and innovative thinking
Ability to cross conventional barriers to perform tasks
Academics, qualifications, ...
Get Cybersecurity Blue Team Strategies now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.