Free Downloads
Crafting The InfoSec Playbook: Security Monitoring And Incident Response Master Plan

Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.Learn incident response fundamentals—and the importance of getting back to basicsUnderstand threats you face and what you should be protectingCollect, mine, organize, and analyze as many relevant data sources as possibleBuild your own playbook of repeatable methods for security monitoring and responseLearn how to put your plan into action and keep it running smoothlySelect the right monitoring and detection tools for your environmentDevelop queries to help you sort through data and create valuable reportsKnow what actions to take during the incident response phase

Paperback: 276 pages

Publisher: O'Reilly Media; 1 edition (May 24, 2015)

Language: English

ISBN-10: 1491949406

ISBN-13: 978-1491949405

Product Dimensions: 7 x 0.6 x 9.2 inches

Shipping Weight: 1.1 pounds (View shipping rates and policies)

Average Customer Review: 4.4 out of 5 stars  See all reviews (8 customer reviews)

Best Sellers Rank: #405,926 in Books (See Top 100 in Books) #88 in Books > Computers & Technology > Security & Encryption > Viruses #353 in Books > Computers & Technology > Networking & Cloud Computing > Network Security #413 in Books > Computers & Technology > Networking & Cloud Computing > Network Administration

An extremely important piece of advice in Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan is on page 85, where authors Jeff Bollinger, Brandon Enright and Matthew Valites write that you will need at least one dedicated and full-time person to analyze your security event data.When creating programs for information security monitoring and its corresponding incident response plans, far too many firms focus solely on the software, hardware and appliances; not realizing it takes people to make it work. The book shows how to take the potential of them devices, and put them into actuality. The book notes that it’s not a trivial matter, but it’s not rocket science, and it can be done.The premise of the book is that only when you know and can describe exactly what you are trying to protect; can you develop an information security playbook and incident response program. The book then goes into detail just how to do that.The book is an extremely valuable reference for anyone who wants to build out a security monitoring and incident program. The authors take a very hands-on approach on how to develop a strategy to ensure that the process is done effectively, rather than by simply installing a few appliances and hoping for the best.While the authors are all part of the Cisco Computer Security Incident Response Team, the book takes a vendor agnostic approach to the topic.Security monitoring and incident response are two critical component of a larger information security program. For those that are serious about building that out, Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan is a great resource to start with.

Very good guide on InfoSec program policy development. I think this should be mandatory for anyone moving 'up the chain' in security. In my role as a consultant, I find that there are smart people doing good things...in silos. This guide is a good foundation for building a program that ties disparate efforts together as a cohesive and effective infosec program. This book continues to be a good reference.I think the book could have been improved with more pictures of alligators and other dangerous reptilian creatures.

Phenomenal book, chock full of great ideas about how to build and operationalize your SOC. Includes high level concepts as well as detailed technical ideas. Highly recommended for anyone building or improving a security program.

Down to earth with tips you can take straight to the InfoSec bank.

Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan The Practice of Network Security Monitoring: Understanding Incident Detection and Response Beyond Initial Response--2Nd Edition: Using The National Incident Management System Incident Command System Hackers vs. Security Pros: A Security Manager's Playbook (The CTO Playbook 1) Beginner's Guide to Information Security: Kickstart your security career with insight from InfoSec experts Real Digital Forensics: Computer Security and Incident Response The Computer Incident Response Planning Handbook: Executable Plans for Protecting Information at Risk Incident Response & Computer Forensics, Third Edition Home Security: Top 10 Home Security Strategies to Protect Your House and Family Against Criminals and Break-ins (home security monitor, home security system diy, secure home network) Fetal Heart Monitoring: Principles and Practices (AWHONN, Fetal Heart Monitoring) Host Response to Biomaterials: The Impact of Host Response on Biomaterial Selection Cryptography InfoSec Pro Guide (Beginner's Guide) Social Security: Time for a Life of Leisure - The Guide of Secrets to Maximising Social Security Retirement Benefits and Planning Your Retirement (social ... disability, social security made simple) Master Locksmithing: An Expert's Guide to Master Keying, Intruder Alarms, Access Control Systems, High-Security Locks... Saint Germain: Master Alchemist: Spiritual Teachings From An Ascended Master (Meet the Master) Extrusion Detection: Security Monitoring for Internal Intrusions The Rise of China in Asia: Security Implications - Senkaku Islands, Taiwan, North Korea on the Brink, Chinese Threat to Neighbors, India's Response to China, South China Sea HCG Diet: HCG Diet Plan: HCG Diet Cookbook with 50 + HCG Diet Recipes and Videos - HCG Diet for Beginners: HCG Diet Plan - Follow HCG Diet Plan (HCG ... HCG Diet for Beginners, HCG Phase 3) War Plan Red: The United States' Secret Plan to Invade Canada and Canada's Secret Plan to Invade the United States Cómo realizar un buen plan de marketing y no morir en el intento.: Guía paso a paso para realizar tu Plan de Marketing. Aprende a realizar análisis de ... y plan de acción (Spanish Edition)