
- 254 pages
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Agile Security Operations
About this book
Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile threat intelligenceKey Featuresβ’ Explore robust and predictable security operations based on measurable service performanceβ’ Learn how to improve the security posture and work on security auditsβ’ Discover ways to integrate agile security operations into development and operationsBook DescriptionAgile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best.Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. You'll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding.By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference.What you will learnβ’ Get acquainted with the changing landscape of security operationsβ’ Understand how to sense an attacker's motives and capabilitiesβ’ Grasp key concepts of the kill chain, the ATT&CK framework, and the Cynefin frameworkβ’ Get to grips with designing and developing a defensible security architectureβ’ Explore detection and response engineeringβ’ Overcome challenges in measuring the security postureβ’ Derive and communicate business values through security operationsβ’ Discover ways to implement security as part of development and business operationsWho this book is forThis book is for new and established CSOC managers as well as CISO, CDO, and CIO-level decision-makers. If you work as a cybersecurity engineer or analyst, you'll find this book useful. Intermediate-level knowledge of incident response, cybersecurity, and threat intelligence is necessary to get started with the book.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Section 1: Incidence Response: The Heart of Security
- Chapter 1, How Security Operations Are Changing
- Chapter 2, Incident Response β A Key Capability in Security Operations
- Chapter 3, Engineering for Incident Response
Chapter 1: How Security Operations Are Changing
- Passing audits is the result of security operations done well. Audits do not drive improvement β making improvements in security operations drives improvement overall.
- Security operations vitally develop and enrich cybersecurity conversations at executive level mainly through the enhanced visibility they provide. Having a conversation about what happens on your network as opposed to what one reads about in the newspaper is inherently more powerful and convincing, especially if it can be backed up with evidence.
- The visibility and context provided by well-executed cybersecurity operations inherently changes the strategy and risk discussion, leading to better grounded risk and compliance programs.
- Building in the visibility and response components into applications and networks from the outset leads to better security architecture and changes the conversation from security being a blocker to security being an enabler of the business.
- If security operations are the core of an organization's cyber risk management, then the activities undertaken to resolve security incidents are at the heart of security operations. The viewpoint that I will take in this book, and that in my view defines agile security operations, is that effective incident response is the key measure when it comes to risk reduction from threats. In turn, the need to perform incident response then drives the rest of the security operations.
- Understanding the role of security operations in risk management
- Defining security operations
- Understanding why security operations need to be agile
- Why security is hard
- Security incidents
- Security solutions in search of a problem
- The scope of security operations
- Where security operations turn agile
Why security is hard
Security operations
Cybersecurity, threats, and risk
Table of contents
- Agile Security Operations
- Contributors
- Preface
- Section 1: Incidence Response: The Heart of Security
- Chapter 1: How Security Operations Are Changing
- Chapter 2: Incident Response β A Key Capability in Security Operations
- Chapter 3: Engineering for Incident Response
- Section 2: Defensible Organizations
- Chapter 4: Key Concepts in Cyber Defense
- Chapter 5: Defensible Architecture
- Chapter 6: Active Defense
- Chapter 7: How Secure Are You? β Measuring Security Posture
- Section 3: Advanced Agile Security Operations
- Chapter 8: Red, Blue, and Purple Teaming
- Chapter 9: Running and Operating Security Services
- Chapter 10: Implementing Agile Threat Intelligence
- Appendix
- Further reading
- Other Books You May Enjoy