logo

EbookBell.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link:  https://ebookbell.com/faq 


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookBell Team

Resilient Cybersecurity 1st Edition by Mark Dunkerley ISBN 1835462510 9781835462515

  • SKU: BELL-200635618
Resilient Cybersecurity 1st Edition by Mark Dunkerley ISBN 1835462510 9781835462515
$ 31.00 $ 45.00 (-31%)

5.0

20 reviews

Resilient Cybersecurity 1st Edition by Mark Dunkerley ISBN 1835462510 9781835462515 instant download after payment.

Publisher: Packt Publishing
File Extension: EPUB
File size: 43.74 MB
Author: Mark Dunkerley
Language: English
Year: 2024

Product desciption

Resilient Cybersecurity 1st Edition by Mark Dunkerley ISBN 1835462510 9781835462515 by Mark Dunkerley instant download after payment.

Resilient Cybersecurity 1st Edition by Mark Dunkerley - Ebook PDF Instant Download/Delivery: 1835462510, 9781835462515
Full download Resilient Cybersecurity 1st Edition after payment

Product details:

ISBN 10: 1835462510 
ISBN 13: 9781835462515
Author: Mark Dunkerley

Build a robust cybersecurity program that adapts to the constantly evolving threat landscape

Key Features
Gain a deep understanding of the current state of cybersecurity, including insights into the latest threats such as Ransomware and AI
Lay the foundation of your cybersecurity program with a comprehensive approach allowing for continuous maturity
Equip yourself and your organizations with the knowledge and strategies to build and manage effective cybersecurity strategies
Book Description
Building a Comprehensive Cybersecurity Program addresses the current challenges and knowledge gaps in cybersecurity, empowering individuals and organizations to navigate the digital landscape securely and effectively. Readers will gain insights into the current state of the cybersecurity landscape, understanding the evolving threats and the challenges posed by skill shortages in the field. This book emphasizes the importance of prioritizing well-being within the cybersecurity profession, addressing a concern often overlooked in the industry. You will construct a cybersecurity program that encompasses architecture, identity and access management, security operations, vulnerability management, vendor risk management, and cybersecurity awareness. It dives deep into managing Operational Technology (OT) and the Internet of Things (IoT), equipping readers with the knowledge and strategies to secure these critical areas. You will also explore the critical components of governance, risk, and compliance (GRC) within cybersecurity programs, focusing on the oversight and management of these functions. This book provides practical insights, strategies, and knowledge to help organizations build and enhance their cybersecurity programs, ultimately safeguarding against evolving threats in today's digital landscape.
What you will learn
Build and define a cybersecurity program foundation
Discover the importance of why an architecture program is needed within cybersecurity
Learn the importance of Zero Trust Architecture
Learn what modern identity is and how to achieve it
Review of the importance of why a Governance program is needed
Build a comprehensive user awareness, training, and testing program for your users
Review what is involved in a mature Security Operations Center
Gain a thorough understanding of everything involved with regulatory and compliance
Who this book is for
This book is geared towards the top leaders within an organization, C-Level, CISO, and Directors who run the cybersecurity program as well as management, architects, engineers and analysts who help run a cybersecurity program. Basic knowledge of Cybersecurity and its concepts will be helpful.

Resilient Cybersecurity 1st Table of contents:

  1. Who this book is for
  2. What this book covers
  3. To get the most out of this book
  4. Get in touch
  5. Current State
  6. An Evolving Digital World
  7. Increasing Reliance on Technology
  8. Digital Transformation
  9. The Evolving Landscape of Cybersecurity
  10. The Current Threat Landscape
  11. Common Cyber Threat Actors
  12. Types of Cyberattacks
  13. Ransomware in More Detail
  14. Other Types of Attacks
  15. Supply Chain Challenges
  16. Impact on Organizations
  17. Special Considerations for OT and IoT
  18. Emerging Threats – AI and Beyond
  19. The Importance of Statistics
  20. Key Reports and Findings
  21. IBM’s Cost of a Data Breach Report
  22. Verizon Data Breach Investigation Report (DBIR)
  23. CISO Perspectives and Challenges
  24. Federal Bureau of Investigation Internet Crime Report
  25. Additional Resources and Staying Updated
  26. Breaches Continue to Rise
  27. Identity Theft Resource Center (ITRC)
  28. Wikipedia’s List of Data Breaches
  29. Consumer Impact and Awareness
  30. Assumption of Compromise and Defensive Measures
  31. Skillset Challenges
  32. Common Cybersecurity Roles
  33. Obsolete, Persistent, and Emerging Roles in Cybersecurity
  34. High-Level Cybersecurity Organization Structure
  35. Shortage of Cybersecurity Expertise
  36. ICS2 2023 Cybersecurity Workforce Study
  37. National Cyber Workforce and Education Strategy (NCWES)
  38. Addressing the Talent Gap with Outsourcing
  39. Retaining Top Performers
  40. Methods of Staying Current
  41. Challenges in the Hiring Process
  42. Innovative Hiring Practices
  43. Changing the Negative Perception of Cybersecurity
  44. Encouraging Collaboration and Mentorship
  45. Prioritizing Well-Being
  46. Data on Well-Being and Burnout
  47. Statistics on Mental Health in Cybersecurity
  48. Strategies for Promoting Well-Being
  49. Strategies for Individuals and Leaders
  50. Summary
  51. Join our community on Discord!
  52. Setting the Foundations
  53. Learn the Business
  54. Understanding the Business Environment
  55. Embracing Organizational Principles and Culture
  56. Business Relationships
  57. Navigating the Business
  58. Everything Is About Risk
  59. What about Finances?
  60. Building Blocks for Your Cybersecurity Program
  61. Cybersecurity Architecture
  62. Identity and Access Management
  63. Cybersecurity Operations
  64. Vulnerability Management
  65. Cybersecurity Awareness, Training, and Testing
  66. Vendor Risk Management
  67. Proactive Services
  68. Operations Technology (OT) and the Internet of Things (IoT)
  69. Governance, Risk, and Compliance (GRC)
  70. The Cyber Mindmap
  71. Defining the Cybersecurity Organization
  72. Roles and Responsibilities
  73. Outsourcing
  74. Change Management
  75. Communications
  76. Summary
  77. Building Your Roadmap
  78. The Importance of a Roadmap
  79. Program and Project Management
  80. Assessing the Current State
  81. Learning the Business
  82. Non-Technical Assessment
  83. Technical Assessment
  84. Bringing It Together
  85. Immediate Short-Term Impact (2–4 Months)
  86. Continue To Learn The Business And Assess The Current Risk
  87. Define the Strategy
  88. Build your desired Organizational Structure
  89. Select a Framework and Architecture
  90. Identity and Access Management Fundamentals
  91. Penetration Testing
  92. Look to implement 24/7/365 Security Monitoring
  93. Visibility of Assets
  94. Vulnerability Scanning
  95. User Awareness, Training, and Testing
  96. Cybersecurity Insurance
  97. Risk Register
  98. Email Security Review and Hardening
  99. Patching Cadence Review and Improvements
  100. Is there any Operational Technology (OT) or Internet of Things (IoT) to be reviewed?
  101. Short-Term Impact (5–12 Months)
  102. Rolled-over Items from the 2–4 Months Roadmap
  103. Assessments, Audits and Certifications
  104. Policy Reviews and User Acceptance
  105. Data Loss Prevention and Information Protection
  106. Business Continuity Planning, Disaster Recovery Panning and the Cybersecurity Incident Response Plan
  107. Tabletop Exercises
  108. Current Cybersecurity Portfolio Review
  109. Cybersecurity Program and Modernization
  110. Vendor Risk Management Review
  111. Application and Web Testing, including a SecDevOps Review
  112. Integrate with the Architecture Review Process
  113. Reporting Out
  114. Long-Term Impact (1–3+ Years)
  115. Rolled-over Items from the 5–12 Months Roadmap
  116. Formalize and Mature the GRC Program
  117. Mature User Awareness, Training, and Testing
  118. Identity and Access Management (IAM) Enhancement
  119. Mature Vulnerability Management
  120. Mature Vendor Risk Management
  121. Mature Security Operations
  122. Ongoing Assessments, Audits, and Certificates
  123. Focus on Proactive Services
  124. Ongoing Cybersecurity Portfolio Review and Modernization
  125. OT and IoT Program Maturity
  126. Continuous Improvement
  127. Summary
  128. Join our community on Discord!
  129. Solidifying Your Strategy
  130. The Importance of a Strategy
  131. What is your Architecture Strategy?
  132. Architecture Roles
  133. Alignment with Broader Architecture Strategies
  134. A Comprehensive View
  135. The Need to Modernize
  136. Core Components
  137. Cloud First
  138. On-Premises Data Center
  139. Cloud Data Center
  140. Hybrid Data Center
  141. Why a Cybersecurity Framework?
  142. National Institute of Standards and Technology (NIST)
  143. International Organization for Standardization (ISO)
  144. Managing your Product and Vendor Portfolio
  145. Resource Management (In-House versus Outsourcing)
  146. Summary
  147. Join our community on Discord!
  148. Cybersecurity Architecture
  149. Cybersecurity within Architecture
  150. Understanding IT Architecture
  151. Understanding Security Architecture
  152. Importance of Embedding Cybersecurity within Architecture
  153. Benefits of Embedding Cybersecurity within Architecture
  154. Detailed Architecture Review Process
  155. Required Architecture Diagrams
  156. Cloud Services Architecture
  157. Cybersecurity Architecture Documentation
  158. Architecture Review Process
  159. The Strategy, Scope, And Goals
  160. Committees and Teams
  161. Process Logistics
  162. Foundation Setup
  163. Meeting Schedules
  164. Change Management
  165. Project Management
  166. Lifecycle Process
  167. Intake Process
  168. A complete Checklist
  169. Architecture documentation
  170. Vendor specific documentation
  171. Your Cybersecurity Architecture Foundation
  172. Zero-Trust Architecture (ZTA)
  173. ZTA Models
  174. CISA Zero Trust Model
  175. Microsoft Zero Trust Model
  176. ZTA Pillars
  177. ZTA Maturity Model
  178. Technical Architecture
  179. Following a Baseline
  180. Building Baseline Controls
  181. Identity Architecture
  182. Endpoint architecture
  183. Endpoint Management and Advanced Protection
  184. Data architecture
  185. Data Inventory and Classification
  186. Data Protection
  187. Data Governance and Monitoring
  188. Regulatory and Legal Considerations
  189. Application Architecture
  190. Authentication and Access Control
  191. Update Management
  192. Infrastructure and Business Continuity
  193. Advanced Components and Integration
  194. Application Security and Protection
  195. Governance of Applications
  196. Infrastructure architecture
  197. Infrastructure Protection
  198. Infrastructure Management
  199. Infrastructure Security
  200. Advanced Security Requirements
  201. Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)
  202. Network architecture
  203. Challenges with Network Management
  204. Network Vulnerabilities
  205. Network Baselines
  206. Key Technologies for Network Security
  207. Network Management
  208. Collaboration Architecture
  209. Summary
  210. Join our community on Discord!
  211. Identity and Access Management
  212. Identity and Access Management Overview
  213. Identification
  214. Authentication
  215. Authorization
  216. Accountability
  217. Modernizing Your Identity Architecture
  218. Identity and Access Management Statistics
  219. Legacy Identity and Access Management
  220. The Need to Modernize
  221. Identity and Access Management Modernization Strategy
  222. Identity and Access Management Modernization Roadmap
  223. Account and Access Management
  224. Identity Life Cycle Process
  225. HR and Identity Management
  226. Directory Services
  227. Hybrid Identities
  228. Cloud Identities
  229. Group Management and RBAC
  230. Service Accounts
  231. External Access
  232. Privileged Access
  233. Governance, Reporting, and Auditing
  234. Securing Your Identities
  235. Directory Services Protection
  236. Privileged Access Strategy
  237. Password Management
  238. Password Vaulting
  239. MFA
  240. Non-User Accounts
  241. SSO
  242. Privileged Accounts
  243. Local Administrative Access
  244. PAM, PIM, and JIT
  245. PoLP and JEA
  246. SoD
  247. Insider Threats
  248. Physical Security
  249. Enhanced Identity Security
  250. Biometrics
  251. Phishing-Resistant MFA
  252. Passwordless
  253. Conditional-Based Policies
  254. Risk-Based Protection
  255. SIEM Integration
  256. Summary
  257. Join our community on Discord!
  258. Cybersecurity Operations
  259. An Overview of Cybersecurity Operations
  260. Security Operations Center (SOC)
  261. Threat Detection
  262. Incident Management and Response
  263. Artificial Intelligence (AI)
  264. Security Operations Center (SOC)
  265. Cybersecurity Operations Model
  266. Traditional Security Operations Center (SOC)
  267. Security Operations Center as a Service (SOCaaS)
  268. Managed Detection and Response (MDR)
  269. Managed Security Services Provider (MSSP)
  270. Hybrid Model
  271. SOC Organization Structure
  272. Log Collection, Analysis, and Automation
  273. Security Information and Event Management (SIEM)
  274. Security Orchestration, Automation, and Response (SOAR)
  275. Extended Detection and Response (XDR)
  276. Processes and SOPs
  277. SLAs and Key Metrics
  278. Governance
  279. Threat Detection
  280. Asset Management and Visibility
  281. Digital Asset Monitoring
  282. Extended Detection and Response (XDR)
  283. Cloud Access Security Broker (CASB)
  284. Threat Intelligence
  285. MITRE ATT&CK
  286. Threat Hunting
  287. Incident Management and Response
  288. Incident Handling and Severity
  289. Incident Reporting Methods
  290. Incident Categorization
  291. Severity Assessment
  292. Incident Investigation
  293. Root Cause Analysis (RCA)
  294. Digital Forensics Incident Response (DFIR)
  295. SOC Analyst Tools
  296. Business Continuity Planning (BCP)
  297. Disaster Recovery Planning (DRP)
  298. Cybersecurity Incident Response Plan (CIRP)
  299. Summary
  300. Join our community on Discord!
  301. Vulnerability Management
  302. Managing Your Vulnerability Program
  303. Building Blocks for Your Program
  304. Program Management and Governance
  305. Asset Management
  306. Vulnerability Discovery and Alerting
  307. Vulnerability Overview
  308. Vulnerability Scanning
  309. External Attack Surface Monitoring
  310. Vulnerability Alerting
  311. Vulnerability Management System
  312. SOC
  313. Threat Intel
  314. External Sources
  315. Vendors
  316. Other
  317. Vulnerability Tracking and Remediation
  318. Tracking Your Vulnerabilities
  319. Scoring
  320. Vulnerability Remediation
  321. Prioritization
  322. Modernizing Your Program
  323. Update Management and Email Protection
  324. Update Deployment
  325. Windows
  326. Other OSes
  327. Browsers
  328. Applications
  329. Email Vulnerability Management
  330. Other Vulnerability Management Considerations
  331. Hardware Vulnerabilities
  332. Virtualization Infrastructure
  333. Network Infrastructure
  334. Cybersecurity Testing
  335. Auditing and Assessments
  336. OT & IoT
  337. Other Activities
  338. Summary
  339. Join our community on Discord!
  340. User Awareness, Training, and Testing
  341. Why the Human Element is the Most Important
  342. Building a User Awareness, Training, and Testing Program
  343. Security Culture and Maturity
  344. Defining Your Program
  345. Ongoing Program Management
  346. Program Management and Governance
  347. User Awareness
  348. Awareness Channels
  349. Portals
  350. Email
  351. Newsletters
  352. User Awareness, Training, and Testing Platform
  353. Other Awareness Channels
  354. Cybersecurity Awareness Month
  355. Policy Awareness
  356. User Awareness Content
  357. Current Trends
  358. User Training and Testing
  359. User Training
  360. Training Schedule
  361. Training Assignment Groups
  362. Training Content
  363. New Hires
  364. Compromised User
  365. Role-Based
  366. User Testing
  367. Testing Schedule
  368. Testing Assignment Groups
  369. Testing Types
  370. Expanding beyond the Traditional Channels of Awareness
  371. Personal Awareness
  372. Real-Life Examples
  373. Consumer Statistics
  374. Personal Protection
  375. External Speakers
  376. Rewards and Recognition
  377. Gamification
  378. Quarterly Cybersecurity Town Halls
  379. Cybersecurity Awareness Week
  380. Cybersecurity Champions
  381. Branding
  382. Mentoring and Development
  383. Summary
  384. Join our community on Discord!
  385. Vendor Risk Management
  386. Understanding Vendor Risk Management
  387. Types of Risk
  388. Vendor Lifecycle Management
  389. Current Landscape
  390. Cybersecurity Risk
  391. Supply Chain Risk
  392. Hardware Compatibility and Certification
  393. Developing a Cybersecurity Vendor Risk Management Program
  394. Policy and Procedures
  395. Roles and Responsibilities
  396. Vendor Management
  397. Cybersecurity Vendor Risk Scoring
  398. Questionnaires
  399. Tiering Vendors
  400. Requirements
  401. Information Collection
  402. Cybersecurity Questionnaire
  403. Third-Party Audit Report
  404. Third-Party Testing Results
  405. Information Security Management Program Documents
  406. Business Continuity Planning (BCP), Cybersecurity Incident Response Plan (CIRP), & Disaster Recovery (DR) Plans
  407. Other Supporting Audit, Risk, and Security Documentation
  408. Cybersecurity Vendor Risk Rating Platform Detailed Report
  409. Risk Management
  410. Governance and Reporting
  411. Integrating a Process Across the Business
  412. Review Process
  413. Escalation Process
  414. Cybersecurity Incident Process
  415. Training
  416. Contract Management
  417. Managing Your Contracts
  418. Types of Contracts
  419. Insurance Requirements
  420. Managing Your Vendors and Ongoing Monitoring
  421. Continuous Monitoring
  422. Annual Reviews
  423. Business Continuity Planning (BCP)
  424. Summary
  425. Join our community on Discord!
  426. Proactive Services
  427. Why Proactive Services?
  428. Cybersecurity Testing
  429. Types of Testing
  430. Penetration Testing
  431. Executing a Penetration Test
  432. Rules of Engagement
  433. Reviewing the Findings
  434. Application Testing
  435. Physical Security Testing
  436. Other Testing Activities
  437. Incident Response Planning
  438. Building an Incident Response Plan
  439. Introduction
  440. Purpose and Scope
  441. Roles and Responsibilities
  442. Communications
  443. Incident Response and Recovery Process
  444. Lessons Learned
  445. Appendix
  446. Playbooks
  447. Tabletop Exercises
  448. What Is a Tabletop Exercise?
  449. Planning a Tabletop Exercise
  450. Executing a Tabletop Exercise
  451. Final Report and Remediation
  452. Other Proactive Services
  453. Threat Briefs
  454. Threat Hunts
  455. Incident Response Training
  456. Disclosure Programs
  457. Ransomware Best Practices
  458. Other
  459. Summary
  460. Join our community on Discord!
  461. Operational Technology and the Internet of Things
  462. What Are OT and IoT?
  463. OT
  464. IoT
  465. Why Securing This Technology Is So Important
  466. OT Statistics
  467. IoT Statistics
  468. A Dedicated Program
  469. Governance, Risk, and Compliance
  470. Cybersecurity Architecture
  471. Identity and Access Management
  472. Cybersecurity Operations
  473. Cybersecurity Awareness, Training, and Testing
  474. Vendor Risk Management
  475. Vulnerability Management
  476. Proactive Services
  477. Protecting OT and IoT Environments
  478. OT Malware
  479. MITRE ATT&CK
  480. ICS Advisories
  481. Best Practices
  482. Responding to OT and IoT Cybersecurity Incidents
  483. BCP and DRP
  484. Incident Response Plan
  485. Tabletop Exercises
  486. Summary
  487. Join our community on Discord!
  488. Governance Oversight
  489. The Importance of Program Governance
  490. Program Structure and Governance

People also search for Resilient Cybersecurity 1st:

discuss the importance of a resilient cybersecurity posture
    
resilient cybersecurity pdf
    
resilient cybersecurity mark dunkerley
    
resilient cybersecurity packt
    
resilient cybersecurity book
    
cybersecurity and cyber resilient supply chains

 

 

Tags: Mark Dunkerley, Resilient, Cybersecurity

Related Products