12 After the hack
This chapter covers
- Working through real-life breaches to understand how events unfold
- Who we can turn to for help during a security incident and how to derive the information we need to capture and share
- Using critical thinking skills and root-cause analysis
- Applying agile techniques to a security breach
- Distilling key actionable data that can be used to improve and enhance our security strategy
As mentioned in previous chapters, we will all get hacked. What’s important is how we prepare for that, how we mitigate the risks we face, and—most important of all—how we recover after a successful attack. In this final chapter, we look at how to prepare to fail. Because we know that we will eventually face a security breach, we ...
Get Making Sense of Cybersecurity now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.