Kim Crawley - 8 Steps to Better Security

Здесь есть возможность читать онлайн «Kim Crawley - 8 Steps to Better Security» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

8 Steps to Better Security: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «8 Steps to Better Security»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Harden your business against internal and external cybersecurity threats with a single accessible resource.  In 
, cybersecurity researcher and writer Kim Crawley delivers a grounded and practical roadmap to cyber resilience in any organization. Offering you the lessons she learned while working for major tech companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and Venafi, Crawley condenses the essence of business cybersecurity into eight steps. 
Written to be accessible to non-technical businesspeople as well as security professionals, and with insights from other security industry leaders, this important book will walk you through how to: 
Foster a strong security culture that extends from the custodial team to the C-suite Build an effective security team, regardless of the size or nature of your business Comply with regulatory requirements, including general data privacy rules and industry-specific legislation Test your cybersecurity, including third-party penetration testing and internal red team specialists Perfect for CISOs, security leaders, non-technical businesspeople, and managers at any level, 
 is also a must-have resource for companies of all sizes, and in all industries.

8 Steps to Better Security — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «8 Steps to Better Security», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Table of Contents

1 Cover

2 Title Page

3 Foreword

4 Introduction

5 Chapter 1: Step 1: Foster a Strong Security Culture Kevin Mitnick, Human Hacker Extraordinaire The Importance of a Strong Security Culture Hackers Are the Bad Guys, Right? What Is Security Culture? How to Foster a Strong Security Culture Security Leaders on Security Culture What Makes a Good CISO? The Biggest Mistakes Businesses Make When It Comes to Cybersecurity The Psychological Phases of a Cybersecurity Professional

6 Chapter 2: Step 2: Build a Security Team Why Step 2 Is Controversial How to Hire the Right Security Team…the Right Way Security Team Tips from Security Leaders The “Culture Fit”—Yuck! Cybersecurity Budgets Design Your Perfect Security Team

7 Chapter 3: Step 3: Regulatory Compliance What Are Data Breaches, and Why Are They Bad? The Scary Truth Found in Data Breach Research An Introduction to Common Data Privacy Regulations Payment Card Industry Data Security Standard Governance, Risk Management, and Compliance More About Risk Management Threat Modeling

8 Chapter 4: Step 4: Frequent Security Testing What Is Security Testing? Security Testing Types What's Security Maturity? The Basics of Security Audits and Vulnerability Assessments A Concise Guide to Penetration Testing Security Leaders on Security Maturity Security Testing Is Crucial

9 Chapter 5: Step 5: Security Framework Application What Is Incident Response? Your Computer Security Incident Response Team Cybersecurity Frameworks

10 Chapter 6: Step 6: Control Your Data Assets The CIA Triad Access Control Patch Management Physical Security and Your Data Malware Cryptography Basics Bring Your Own Device and Working from Home Data Loss Prevention Managed Service Providers The Dark Web and Your Data Security Leaders on Cyber Defense Control Your Data

11 Chapter 7: Step 7: Understand the Human Factor Social Engineering Phishing What Can NFTs and ABA Teach Us About Social Engineering? How to Prevent Social Engineering Attacks on Your Business UI and UX Design Internal Threats Hacktivism Note

12 Chapter 8: Step 8: Build Redundancy and Resilience Understanding Data and Networks Building Capacity and Scalability with the Power of the Cloud Back It Up, Back It Up, Back It Up RAID What Ransomware Taught Business About Backups Business Continuity Disaster Recovery

13 Chapter 9: Afterword Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Step 8 Keeping Your Business Cyber Secure

14 Index

15 Copyright

16 Dedication

17 About the Author

18 Acknowledgments

19 End User License Agreement

Guide

1 Cover

2 Title Page

3 Copyright

4 Dedication

5 About the Author

6 Acknowledgments

7 Foreword

8 Introduction

9 Table of Contents

10 Begin Reading

11 Index

12 End User License Agreement

Pages

1 i

2 xi

3 xii

4 xiii

5 xiv

6 xv

7 xvi

8 xvii

9 xviii

10 xix

11 xx

12 1

13 2

14 3

15 4

16 5

17 6

18 7

19 8

20 9

21 10

22 11

23 12

24 13

25 14

26 15

27 16

28 17

29 18

30 19

31 20

32 21

33 22

34 23

35 24

36 25

37 26

38 27

39 28

40 29

41 30

42 31

43 32

44 33

45 34

46 35

47 36

48 37

49 39

50 40

51 41

52 42

53 43

54 44

55 45

56 46

57 47

58 48

59 49

60 50

61 51

62 52

63 53

64 54

65 55

66 56

67 57

68 58

69 59

70 60

71 61

72 62

73 63

74 64

75 65

76 66

77 67

78 68

79 69

80 70

81 71

82 72

83 73

84 74

85 75

86 76

87 77

88 78

89 79

90 80

91 81

92 82

93 83

94 84

95 85

96 86

97 87

98 88

99 89

100 90

101 91

102 92

103 93

104 94

105 95

106 96

107 97

108 98

109 99

110 100

111 101

112 102

113 103

114 104

115 105

116 106

117 107

118 109

119 110

120 111

121 112

122 113

123 114

124 115

125 116

126 117

127 118

128 119

129 120

130 121

131 122

132 123

133 124

134 125

135 126

136 127

137 128

138 129

139 130

140 131

141 132

142 133

143 134

144 135

145 136

146 137

147 138

148 139

149 140

150 141

151 142

152 143

153 144

154 145

155 146

156 147

157 148

158 149

159 150

160 151

161 152

162 153

163 155

164 156

165 157

166 158

167 159

168 160

169 161

170 162

171 163

172 164

173 165

174 166

175 167

176 168

177 169

178 170

179 171

180 172

181 173

182 174

183 175

184 176

185 177

186 178

187 179

188 180

189 181

190 182

191 183

192 184

193 185

194 186

195 187

196 188

197 189

198 190

199 191

200 192

201 193

202 194

203 195

204 196

205 197

206 198

207 199

208 200

209 201

210 202

211 203

212 204

213 ii

214 iii

215 iv

216 v

217 205

8 Steps to Better Security

A Simple Cyber Resilience Guide for Business

Kim Crawley

8 Steps to Better Security - изображение 1

Foreword

I first met Kim Crawley in person in October 2019, in Toronto at SecTor, Canada's version of DEFCON. We'd been acquainted for a long time via Twitter, and she was the one who originally turned me onto SecTor and inspired me to submit a talk, citing the merits of her hometown and the conference. She was right about both. In between the superb sessions there, amidst the fantastic energy of that conference and the international vibe of the city, we walked around and talked about information security, cyber resilience, and neurodiversity, topics woven deeply into the fabric of both our lives. Over lunch one afternoon, our conversation came around to how our industry can do a better job of helping small and midsize organizations better prepare for strategic response to cybercrime. We agreed that by helping smaller and more vulnerable organizations, the larger organizations and the collective industry as a whole would also benefit. We compared notes on tactics and strategies that don't have to cost a lot of time or money.

Shortly after our time and discussions at SecTor, Covid-19 hit. Kim didn't slow down. She founded DisInfoSec, a pop-up infosec conference showcasing infosec professionals who identify as neurodivergent (including ADD, AHDH, autism, Asperger's, dyslexia, and more). Inspired by Lesley Carhart's PancakesCon and other events, DisInfoSec was a first-of-its-kind event and took place on July 11, 2020. The con included a lot of great talks and raised funds for the Autistic Self Advocacy Network, the Autistic Women and Nonbinary Network, and the Council of Canadians with Disabilities. Kim's commitment to improving inclusion and nudging the world to a better place is showcased in her actions, and this new book is merely an extension of her productive mindset.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «8 Steps to Better Security»

Представляем Вашему вниманию похожие книги на «8 Steps to Better Security» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «8 Steps to Better Security»

Обсуждение, отзывы о книге «8 Steps to Better Security» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x