Book description
A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisation
Key Features
- Protect your organization from cybersecurity threats with field-tested strategies
- Discover the most common ways enterprises initially get compromised
- Measure the effectiveness of your organization’s current cybersecurity program against cyber attacks
Book Description
After scrutinizing numerous cybersecurity strategies, Microsoft’s former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more.
Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.
The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them.
By the end of this book, you will know how to measure the effectiveness of your organization’s cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
What you will learn
- Discover cybersecurity strategies and the ingredients critical to their success
- Improve vulnerability management by reducing risks and costs for your organization
- Learn how malware and other threats have evolved over the past decade
- Mitigate internet-based threats, phishing attacks, and malware distribution sites
- Weigh the pros and cons of popular cybersecurity strategies of the past two decades
- Implement and then measure the outcome of a cybersecurity strategy
- Learn how the cloud provides better security capabilities than on-premises IT environments
Who this book is for
This book is designed to benefit engineers, leaders, or any professional with either a responsibility for cyber security within their organization, or an interest in working in this ever-growing field.
Table of contents
- Preface
-
Ingredients for a Successful Cybersecurity Strategy
- What is a cybersecurity strategy?
- How organizations get initially compromised and the cybersecurity fundamentals
- Understanding the difference between the attacker's motivations and tactics
-
Other ingredients for a successful strategy
- Business objective alignment
- Cybersecurity vision, mission, and imperatives
- Senior executive and board support
- Understand the risk appetite
- Realistic view of current cybersecurity capabilities and technical talent
- Compliance program and control framework alignment
- An effective relationship between cybersecurity and IT
- Security culture
- Chapter summary
- References
-
Using Vulnerability Trends to Reduce Risk and Costs
- Introduction
-
Vulnerability Management Primer
- Vulnerability Disclosure Data Sources
- Industry Vulnerability Disclosure Trends
- Reducing Risk and Costs – Measuring Vendor and Product Improvement
-
Operating System Vulnerability Trends
- Microsoft Operating System Vulnerability Trends
- Windows XP Vulnerability Trends
- Windows 7 Vulnerability Trends
- Windows Server 2012 and 2016 Vulnerability Trends
- Windows 10 Vulnerability Trends
- Linux Kernel Vulnerability Trends
- Google Android Vulnerability Trends
- Apple macOS Vulnerability Trends
- Operating Systems Vulnerability Trend Summary
- Web Browser Vulnerability Trends
- Vulnerability Management Guidance
- Chapter summary
- References
-
The Evolution of the Threat Landscape – Malware
- Introduction
- Why is there so much malware on Windows compared to other platforms?
- Data sources
- About malware
- Global Windows malware infection analysis
-
Regional Windows malware infection analysis
- The long-term view of the threat landscape in the Middle East and Northern Africa
- The long-term view of the threat landscape in the European Union and Eastern Europe
- The long-term view of the threat landscape in select locations in Asia
- The long-term view of the threat landscape in select locations in the Americas
- Regional Windows malware infection analysis conclusions
- Global malware evolution
- The great debate – are anti-malware solutions really worthwhile?
- Threat intelligence best practices and tips
- Chapter summary
- References
- Internet-Based Threats
-
Cybersecurity Strategies
- Introduction
- Measuring the efficacy of cybersecurity strategies
-
Cybersecurity strategies
- Protect and Recover Strategy
- Endpoint Protection Strategy
- Physical Control and Security Clearances as a Security Strategy
- Compliance as a Security Strategy
- Application-Centric Strategy
- Identity-Centric Strategy
- Data-Centric Strategy
- Attack-Centric Strategy
- Cybersecurity strategies summary
- DevOps and DevSecOps
- Zero Trust
- Chapter summary
- References
- Strategy Implementation
- Measuring Performance and Effectiveness
- The Cloud – A Modern Approach to Security and Compliance
- Other Books You May Enjoy
- Index
Product information
- Title: Cybersecurity Threats, Malware Trends, and Strategies
- Author(s):
- Release date: May 2020
- Publisher(s): Packt Publishing
- ISBN: 9781800206014
You might also like
book
Cybersecurity Threats, Malware Trends, and Strategies - Second Edition
Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to …
book
Cybersecurity - Attack and Defense Strategies
Updated edition of the bestselling guide for planning attack and defense strategies based on the current …
book
Cybersecurity - Attack and Defense Strategies
Key Features Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior …
book
Cybersecurity – Attack and Defense Strategies - Second Edition
Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats …