The Executive's Cybersecurity Advisor: Gain Critical Business Insight in Minutes

Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed; they steal data and disrupt organizations. The fact that attacks succeed makes Response the most business-critical discipline. Prevention and Detection also play crucial roles; you want the best measures you can afford. But you need to operate with the assumption that Prevention and Detection will eventually fail. And when they fail, your organization needs a Response plan.


There are hundreds of Cybersecurity vendors with thousands of competing solutions. This book is not about selecting any particular solution. Instead, it explains the three Core Cybersecurity Disciplines (Prevention, Detection, and Response) and shows how they apply to each information asset type { all without incomprehensible jargon and unexplained acronyms. It then provides questions and talking points for conversations with Cybersecurity leaders that will provide clarity into how they direct your organization's Cybersecurity budget.

1140358528
The Executive's Cybersecurity Advisor: Gain Critical Business Insight in Minutes

Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed; they steal data and disrupt organizations. The fact that attacks succeed makes Response the most business-critical discipline. Prevention and Detection also play crucial roles; you want the best measures you can afford. But you need to operate with the assumption that Prevention and Detection will eventually fail. And when they fail, your organization needs a Response plan.


There are hundreds of Cybersecurity vendors with thousands of competing solutions. This book is not about selecting any particular solution. Instead, it explains the three Core Cybersecurity Disciplines (Prevention, Detection, and Response) and shows how they apply to each information asset type { all without incomprehensible jargon and unexplained acronyms. It then provides questions and talking points for conversations with Cybersecurity leaders that will provide clarity into how they direct your organization's Cybersecurity budget.

14.99 In Stock
The Executive's Cybersecurity Advisor: Gain Critical Business Insight in Minutes

The Executive's Cybersecurity Advisor: Gain Critical Business Insight in Minutes

by Michael Gable
The Executive's Cybersecurity Advisor: Gain Critical Business Insight in Minutes

The Executive's Cybersecurity Advisor: Gain Critical Business Insight in Minutes

by Michael Gable

eBook

$14.99 

Available on Compatible NOOK devices, the free NOOK App and in My Digital Library.
WANT A NOOK?  Explore Now

Related collections and offers


Overview

Today, Prevention and Detection are not 100% effective. Some attacks are not stopped by Prevention measures and go undetected. These attacks succeed; they steal data and disrupt organizations. The fact that attacks succeed makes Response the most business-critical discipline. Prevention and Detection also play crucial roles; you want the best measures you can afford. But you need to operate with the assumption that Prevention and Detection will eventually fail. And when they fail, your organization needs a Response plan.


There are hundreds of Cybersecurity vendors with thousands of competing solutions. This book is not about selecting any particular solution. Instead, it explains the three Core Cybersecurity Disciplines (Prevention, Detection, and Response) and shows how they apply to each information asset type { all without incomprehensible jargon and unexplained acronyms. It then provides questions and talking points for conversations with Cybersecurity leaders that will provide clarity into how they direct your organization's Cybersecurity budget.


Product Details

ISBN-13: 9780988540248
Publisher: Journeyman Publishing LLC
Publication date: 11/13/2021
Sold by: Barnes & Noble
Format: eBook
Pages: 100
File size: 5 MB

Table of Contents

About the Author

Executive Summary

Introduction & Primer

Introduction

Cybersecurity Primer

Data Theft

Business Disruption

Ransomware

Attacker Motivation

Testing Infosec

Core Cyber Disciplines

Cyber Disciplines Overview

Response

Detection

Prevention

Budgeting by Cyber Discipline

Agility

Recap

Protecting IT Assets

Identity

What is it?

What do attackers want?

Response

Detection

Prevention

Workstations and IOT Devices

What are they?

What do attackers want?

Response

Detection

Prevention

Network

What is it?

What do attackers want?

Response

Detection

Prevention

Servers or Workloads

What are they?

What do attackers want?

Response

Detection

Prevention

Solutions Primer

Response

Identity

Workstations and IOT Devices

Network

Servers or Workloads

Detection and Prevention

Identity Security

Workstations and IOT Devices

Network

Servers or Workloads

Alert Management

Cyber Conversations

Cyber Defense Review

Identity

Workstations and IOT Devices

Network

Servers or Workloads

Breach Post-Mortem

Author's Postscript

From the B&N Reads Blog

Customer Reviews