Successfully responding to modern cybersecurity threats requires a well-planned, organized, and tested incident management program based on a formal incident management framework.
It must be comprised of technical and non-technical requirements and planning for all aspects of people, process, and technology. This includes evolving considerations specific to the customer environment, threat landscape, regulatory requirements, and security controls.
Only through a highly adaptive, iterative, informed, and continuously evolving full-lifecycle incident management program can responders and the companies they support be successful in combatting cyber threats.
This book is the second in a series of volumes that explains in detail the full-lifecycle cybersecurity incident management program. It has been developed over two decades of security and response experience and honed across thousands of customer environments, incidents, and program development projects.
It accommodates all regulatory and security requirements and is effective against all known and newly evolving cyber threats.
This book will inform the reader on how to assess existing information security and incident management/response programs and refine them or develop new ones in accordance with the needs of the organization and the evolving threat and regulatory landscapes.
*Disclaimer: As an Amazon Associate we earn from qualifying purchases.