e-Books Library

Library eBook PDF EPUB

The Cybersecurity Playbook for Modern Enterprises

The Cybersecurity Playbook for Modern Enterprises
Author : Jeremy Wittkop
Publisher : Packt Publishing Ltd
Total Pages : 280
Release : 2022-03-10
ISBN 10 : 9781803237558
ISBN 13 : 1803237554
Language : EN, FR, DE, ES & NL

Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques Key FeaturesUnderstand what happens in an attack and build the proper defenses to secure your organizationDefend against hacking techniques such as social engineering, phishing, and many morePartner with your end user community by building effective security awareness training programsBook Description Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow. What you will learnUnderstand the macro-implications of cyber attacksIdentify malicious users and prevent harm to your organizationFind out how ransomware attacks take placeWork with emerging techniques for improving security profilesExplore identity and access management and endpoint securityGet to grips with building advanced automation modelsBuild effective training programs to protect against hacking techniquesDiscover best practices to help you and your family stay safe onlineWho this book is for This book is for security practitioners, including analysts, engineers, and security leaders, who want to better understand cybersecurity challenges. It is also for beginners who want to get a holistic view of information security to prepare for a career in the cybersecurity field. Business leaders looking to learn about cyber threats and how they can protect their organizations from harm will find this book especially useful. Whether you're a beginner or a seasoned cybersecurity professional, this book has something new for everyone.

Related Books

The Cybersecurity Playbook for Modern Enterprises
Language: en
Pages: 280
Authors: Jeremy Wittkop
Categories: Computers
Type: BOOK - Published: 2022-03-10 - Publisher: Packt Publishing Ltd

Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques Key FeaturesUnderstand what happe
The Online Safety Playbook
Language: en
Pages: 120
Authors: Arun Soni
Categories: Self-Help
Type: BOOK - Published: 2022-03-01 - Publisher: Blue Rose Publishers

Children must learn several fundamental skills early in life to protect their safety. Before crossing the street, look both ways. Seatbelts must be worn at all
Ransomware Protection Playbook
Language: en
Pages: 320
Authors: Roger A. Grimes
Categories: Computers
Type: BOOK - Published: 2021-09-14 - Publisher: John Wiley & Sons

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is l
Social Engineering
Language: en
Pages: 246
Authors: Michael Erbschloe
Categories: Computers
Type: BOOK - Published: 2019-09-04 - Publisher: CRC Press

This book analyzes of the use of social engineering as a tool to hack random systems and target specific systems in several dimensions of society. It shows how
The Security Culture Playbook
Language: en
Pages: 256
Authors: Perry Carpenter
Categories: Computers
Type: BOOK - Published: 2022-03-08 - Publisher: John Wiley & Sons

Mitigate human risk and bake security into your organization’s culture from top to bottom with insights from leading experts in security awareness, behavior,
Encyclopedia of Criminal Activities and the Deep Web
Language: en
Pages: 1162
Authors: Khosrow-Pour D.B.A., Mehdi
Categories: True Crime
Type: BOOK - Published: 2020-02-01 - Publisher: IGI Global

As society continues to rely heavily on technological tools for facilitating business, e-commerce, banking, and communication, among other applications, there h
The Social Engineer's Playbook
Language: en
Pages: 200
Authors: Jeremiah Talamantes
Categories:
Type: BOOK - Published: 2014-11-23 - Publisher:

The Social Engineer's Playbook is a practical guide to pretexting and a collection of social engineering pretexts for Hackers, Social Engineers and Security Ana
The Cybersecurity Playbook
Language: en
Pages: 224
Authors: Allison Cerra
Categories: Business & Economics
Type: BOOK - Published: 2019-08-06 - Publisher: John Wiley & Sons

The real-world guide to defeating hackers and keeping your business secure Many books discuss the technical underpinnings and complex configurations necessary f
Social Engineering
Language: en
Pages: 344
Authors: Robert W. Gehl
Categories: Computers
Type: BOOK - Published: 2022-03-08 - Publisher: MIT Press

Manipulative communication—from early twentieth-century propaganda to today’s online con artistry—examined through the lens of social engineering. The Uni
Crafting the InfoSec Playbook
Language: en
Pages: 276
Authors: Jeff Bollinger
Categories: Computers
Type: BOOK - Published: 2015-05-07 - Publisher: "O'Reilly Media, Inc."

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a d