Agile Security Operations : Engineering for Agility in Cyber Defense, Detection, and Response.

Book Cover
Average Rating
Published
Birmingham : Packt Publishing, Limited, 2022.
Status
Available Online

Description

Loading Description...

More Details

Format
Language
English
ISBN
9781801812559, 1801812551

Notes

Description
Get to grips with security operations through incident response, the ATT & CK framework, active defense, and agile threat intelligence Key Features Explore robust and predictable security operations based on measurable service performance Learn how to improve the security posture and work on security audits Discover ways to integrate agile security operations into development and operations Book Description Agile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best. Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. You'll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding. By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference. What you will learn Get acquainted with the changing landscape of security operations Understand how to sense an attacker's motives and capabilities Grasp key concepts of the kill chain, the ATT & CK framework, and the Cynefin framework Get to grips with designing and developing a defensible security architecture Explore detection and response engineering Overcome challenges in measuring the security posture Derive and communicate business values through security operations Discover ways to implement security as part of development and business operations Who this book is for This book is for new and established CSOC managers as well as CISO, CDO, and CIO-level decision-makers. If you work as a cybersecurity engineer or analyst, you'll find this book useful. Intermediate-level knowledge of incident response, cybersecurity, and threat intelligence is necessary to get started with the book.
Local note
O'Reilly O'Reilly Online Learning: Academic/Public Library Edition

Table of Contents

Table of Contents How Security Operations Are Changing Incident Response - A Key Capability in Security Operations Engineering for Incident Response Key Concepts in Cyber Defense Defensible Architecture Active Defense How Secure are You? - Measuring Security Posture Red, Blue and Purple Teaming Running and Operating Security Services Implementing Agile Threat Intelligence.

Discover More

Reviews from GoodReads

Loading GoodReads Reviews.

Citations

APA Citation, 7th Edition (style guide)

Hettema, H. (2022). Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response . Packt Publishing, Limited.

Chicago / Turabian - Author Date Citation, 17th Edition (style guide)

Hettema, Hinne. 2022. Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response. Birmingham: Packt Publishing, Limited.

Chicago / Turabian - Humanities (Notes and Bibliography) Citation, 17th Edition (style guide)

Hettema, Hinne. Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response Birmingham: Packt Publishing, Limited, 2022.

Harvard Citation (style guide)

Hettema, H. (2022). Agile security operations: engineering for agility in cyber defense, detection, and response. Birmingham: Packt Publishing, Limited.

MLA Citation, 9th Edition (style guide)

Hettema, Hinne. Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response Packt Publishing, Limited, 2022.

Note! Citations contain only title, author, edition, publisher, and year published. Citations should be used as a guideline and should be double checked for accuracy. Citation formats are based on standards as of August 2021.

Staff View

Grouped Work ID
3910172b-f1e0-eabb-071f-def43d843cdd-eng
Go To Grouped Work View in Staff Client

Grouping Information

Grouped Work ID3910172b-f1e0-eabb-071f-def43d843cdd-eng
Full titleagile security operations engineering for agility in cyber defense detection and response
Authorhettema hinne
Grouping Categorybook
Last Update2025-01-24 12:33:29PM
Last Indexed2025-05-03 03:09:43AM

Book Cover Information

Image Sourcedefault
First LoadedJan 18, 2024
Last UsedJan 25, 2025

Marc Record

First DetectedMar 20, 2023 10:15:09 AM
Last File Modification TimeDec 17, 2024 08:18:36 AM
SuppressedRecord had no items

MARC Record

LEADER04694cam a2200493 i 4500
001on1293248017
003OCoLC
00520241217081725.0
006m     o  d        
007cr cnu---unuuu
008220124s2022    alu     o     000 0 eng d
015 |a GBC1L0208|2 bnb
0167 |a 020426530|2 Uk
019 |a 1292361287|a 1305544397
020 |a 9781801812559|q (electronic book)
020 |a 1801812551|q (electronic book)
035 |a (OCoLC)1293248017|z (OCoLC)1292361287|z (OCoLC)1305544397
037 |a 9781801812559|b Packt Publishing Pvt. Ltd
037 |a 9781801815512|b O'Reilly Media
037 |a 10162954|b IEEE
040 |a EBLCP|b eng|e rda|e pn|c EBLCP|d UKAHL|d UKMGB|d ORMDA|d OCLCO|d OCLCF|d N$T|d YDX|d OCLCQ|d IEEEE|d OCLCO
049 |a MAIN
050 4|a QA76.9.A25|b H48 2022
08204|a 005.8|2 23
1001 |a Hettema, Hinne.
24510|a Agile Security Operations :|b Engineering for Agility in Cyber Defense, Detection, and Response.
264 1|a Birmingham :|b Packt Publishing, Limited,|c 2022.
300 |a 1 online resource (254 pages)
336 |a text|b txt|2 rdacontent
337 |a computer|b c|2 rdamedia
338 |a online resource|b cr|2 rdacarrier
5050 |a Table of Contents How Security Operations Are Changing Incident Response - A Key Capability in Security Operations Engineering for Incident Response Key Concepts in Cyber Defense Defensible Architecture Active Defense How Secure are You? - Measuring Security Posture Red, Blue and Purple Teaming Running and Operating Security Services Implementing Agile Threat Intelligence.
520 |a Get to grips with security operations through incident response, the ATT & CK framework, active defense, and agile threat intelligence Key Features Explore robust and predictable security operations based on measurable service performance Learn how to improve the security posture and work on security audits Discover ways to integrate agile security operations into development and operations Book Description Agile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best. Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. You'll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding. By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference. What you will learn Get acquainted with the changing landscape of security operations Understand how to sense an attacker's motives and capabilities Grasp key concepts of the kill chain, the ATT & CK framework, and the Cynefin framework Get to grips with designing and developing a defensible security architecture Explore detection and response engineering Overcome challenges in measuring the security posture Derive and communicate business values through security operations Discover ways to implement security as part of development and business operations Who this book is for This book is for new and established CSOC managers as well as CISO, CDO, and CIO-level decision-makers. If you work as a cybersecurity engineer or analyst, you'll find this book useful. Intermediate-level knowledge of incident response, cybersecurity, and threat intelligence is necessary to get started with the book.
590 |a O'Reilly|b O'Reilly Online Learning: Academic/Public Library Edition
650 0|a Computer security.|9 65527
650 0|a Business enterprises|x Security measures.
77608|i Print version:|a Hettema, Hinne.|t Agile Security Operations.|d Birmingham : Packt Publishing, Limited, ©2022
85640|u https://library.access.arlingtonva.us/login?url=https://learning.oreilly.com/library/view/~/9781801815512/?ar|x O'Reilly|z eBook
938 |a Askews and Holts Library Services|b ASKH|n AH39547160
938 |a ProQuest Ebook Central|b EBLB|n EBL6843040
938 |a EBSCOhost|b EBSC|n 3122135
938 |a YBP Library Services|b YANK|n 302643600
994 |a 92|b VIA
999 |c 283343|d 283343