5

Cybersecurity Strategies

Every enterprise should have a cybersecurity strategy and the CISO of each of these organizations should be able to articulate it. Whether your organization has a strategy or not, I hope this chapter provokes some thought and provides some tools that are helpful.

In this chapter, we'll cover the following topics:

  • A sampling of cybersecurity strategies that have been employed over the past two decades, including:
    • The Protect and Recover Strategy
    • The Endpoint Protection Strategy
    • The Physical Control and Security Clearances Strategy
    • Compliance as a Security Strategy
    • The Application-Centric Strategy
    • The Identity-Centric Strategy
    • The Data-Centric Strategy
    • Attack-Centric Strategies
  • A look at DevOps
  • A brief introduction ...

Get Cybersecurity Threats, Malware Trends, and Strategies now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.