Book description
With nation-states, organized crime groups, and other attackers scouring systems to steal funds, information, or intellectual property, incident response has become one of today’s most important technology sectors. If you’re not familiar with incident response, this practical report shows security operations center (SOC) analysts, network engineers, system administrators, and management how to conduct a complete incident response program throughout your organization.
Incident response is essential for every business and organization online as more and more attackers look to make a statement, gather information, or make a buck. In this short primer, author Ric Messier explains foundational concepts and then shows you how to identify and categorize incidents. You’ll learn why preparation is key for detecting activity and responding quickly.
- Explore incident response concepts, including the precise meaning of risk, events, incidents, and threats
- Understand the steps necessary to conduct incident identification and categorization
- Learn how threat intelligence helps you discover who’s attacking and why
- Use threat intelligence to conduct threat hunting and inform your prevention and detection strategies
- Understand why an incident response program will help you limit the number of investigations you conduct
Product information
- Title: Incident Response Primer
- Author(s):
- Release date: December 2019
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781492073642
You might also like
book
Incident Response with Threat Intelligence
Learn everything you need to know to respond to advanced cybersecurity incidents through threat hunting using …
book
Cyber Breach Response That Actually Works
You will be breached—the only question is whether you'll be ready A cyber breach could cost …
book
Hands-on Incident Response and Digital Forensics
In this practical guide, the relationship between incident response and digital forensics is explored and you …
book
Digital Forensics and Incident Response
A practical guide to deploying digital forensic techniques in response to cyber security incidents About This …