Cyber Intelligence-Driven Risk
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Richard O. Moore III. Cyber Intelligence-Driven Risk
Table of Contents
List of Illustrations
Guide
Pages
Cyber Intelligence-Driven Risk. How to Build and Use Cyber Intelligence for Business Risk Decisions
Preface
NOTES
Acknowledgments
Introduction
NOTES
NOTES
CHAPTER 1 Objectives of a Cyber Intelligence-Driven Risk Program
NOTES
NOTES
CHAPTER 2 Importance of Cyber Intelligence for Businesses
NOTES
NOTES
CHAPTER 3 Military to Commercial Viability of the CI-DR™ Program
NOTES
NOTES
CHAPTER 4 CI-DR™ Security Program Components
NOTES
NOTE
CHAPTER 5 Functional Capabilities of the CI-DRTM Program
NOTES
NOTES
CHAPTER 6 CI-DR™ Key Capability Next-Generation Security Operations Center
Introduction by Kiran Vangaveti – CEO of BluSapphire
NOTES
NOTES
CHAPTER 7 CI-DR™ Key Capability Cyber Threat Intelligence
NOTES
NOTES
CHAPTER 8 CI-DR™ Key Capability Forensic Teams
NOTES
CHAPTER 9 CI-DR™ Key Capability Vulnerability Management Teams
NOTES
NOTES
CHAPTER 10 CI-DR™ Key Capability Incident Response Teams
NOTES
CHAPTER 11 CI-DR™ Collection Components
NOTES
NOTE
CHAPTER 12 CI-DR™ Stakeholders
NOTES
Conclusion
Glossary
NOTE
About the Author and Chapter Authors. RICHARD O. MOORE III, MSIA, CISSP, CISM, AUTHOR AND EDITOR
STEVEN JOHNSON, DSC, CISM, CISSP, CCE #1463
DEREK OLSON, CISSP, CISM
STEVEN M DUFOUR, ISO LEADER AUDITOR, CERTIFIED QUALITY MANAGER
Index
WILEY END USER LICENSE AGREEMENT
Отрывок из книги
RICHARD O. MOORE III, MSIA, CISSP, CISM
– Carl von Clausewitz
.....
Every industry can benefit by creating or enhancing their business risk management program. Our CI-DR framework provides you, the reader, with the opportunity to build these capabilities, whether internally built, acquired through merger or acquisition, or sourced from the many service providers; this handbook provides the tools and the framework needed to ensure that it is effective. By the end of this book, the reader should understand what functional capabilities are needed to build a CI-DR program; the importance of why the “connective tissue” between the functions and capabilities is so valuable, and how the CI-DR program can be adequately leveraged to assist leaders in making more informed business decisions in the era of increased emergent cyber threats and attacks. Depending on the level of business understanding, the reader will be able to:
If this book inspires you to create new technologies, build a company to support these capabilities, or reduce risk and costs to your organization, please drop us a note on social media (@cybersixactual) or send us an email (https://www.cybersix.com), we would love to hear from you.
.....