Description: Intelligence-Driven Incident Response by Rebekah Brown, Scott J. Roberts With this updated edition, youll learn the fundamentals of intelligence analysis including the best ways to incorporate these techniques into your incident response process. FORMAT Paperback CONDITION Brand New Publisher Description Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But only when you approach incident response with a cyberthreat intelligence mindset will you truly understand the value of that information. In this updated second edition, youll learn the fundamentals of intelligence analysis as well as the best ways to incorporate these techniques into your incident response process. Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This practical guide helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship. In three parts, this in-depth book includes: The fundamentals: get an introduction to cyberthreat intelligence, the intelligence process, the incident response process, and how they all work together Practical application: walk through the intelligence-driven incident response (IDIR) process using the F3EAD process: Find, Fix, Finish, Exploit, Analyze, and Disseminate The way forward: explore big-picture aspects of IDIR that go beyond individual incident response investigations, including intelligence team building Author Biography Rebekah Brown has spent more than two decades working in the intelligence analysis community; her previous roles include NSA network warfare analyst, Operations Chief of a United States Marine Corps cyber unit, and a U.S. Cyber Command training and exercise lead. Rebekah has helped develop threat intelligence and security awareness programs at the federal, state, and local level, as well as at multiple Fortune 500 companies. Scott J Roberts is a security leader, analyst, software developer, and author. He is Head of Threat Research for Interpres Security and has led security teams and project in the defense industrial base, GitHub, Apple, Splunk, and most recently Argo AI. He is also a student and researcher at Utah State University, where he is focused on Anticipatory Intelligence, tackling emergent problems in national and cybersecurity. Scott J Roberts has served as an Advisory Committee for SANS CTI & DFIR Summits. Along with Rebekah Brown, he authored OReillys Intelligence-Driven Incident Response and has spoken at numerous industry events on incident response and cyber threat intelligence. Scott J Roberts is passionate about improving security via automation, especially on macOS, and developing open and closed source tooling in Python, Go, & Swift. Details ISBN109812068X Author Scott J. Roberts Pages 325 Publisher OReilly Media Year 2023 ISBN-13 9781098120689 Format Paperback Imprint OReilly Media Subtitle Outwitting the Adversary Place of Publication Sebastopol Country of Publication United States AU Release Date 2023-10-31 NZ Release Date 2023-10-31 UK Release Date 2023-10-31 ISBN-10 109812068X DEWEY 005.8 Audience Professional & Vocational Publication Date 2023-06-23 US Release Date 2023-06-23 We've got this At The Nile, if you're looking for it, we've got it. With fast shipping, low prices, friendly service and well over a million items - you're bound to find what you want, at a price you'll love! TheNile_Item_ID:142633540;
Price: 117.07 AUD
Location: Melbourne
End Time: 2024-11-26T03:08:42.000Z
Shipping Cost: 0 AUD
Product Images
Item Specifics
Restocking fee: No
Return shipping will be paid by: Buyer
Returns Accepted: Returns Accepted
Item must be returned within: 30 Days
Format: Paperback
ISBN-13: 9781098120689
Author: Rebekah Brown, Scott J. Roberts
Type: NA
Book Title: Intelligence-Driven Incident Response
Language: Does not apply
Publication Name: NA