The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services
This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible.
Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation.
This guide will be indispensable for everyone responsible for delivering security services―managers and cybersecurity professionals alike.
Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology
Identify, recruit, interview, onboard, and grow an outstanding SOC team
Thoughtfully decide what to outsource and what to insource
Collect, centralize, and use both internal data and external threat intelligence
Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts
Reduce future risk by improving incident recovery and vulnerability management
Apply orchestration and automation effectively, without just throwing money at them
Position yourself today for emerging SOC technologies
Die Inhaltsangabe kann sich auf eine andere Ausgabe dieses Titels beziehen.
Joseph Muniz is an architect and security researcher in the Cisco Security Sales and Engineering Organization. He is driven by making the world a safer place through education and adversary research. Joseph has extensive experience in designing security solutions and architectures as a trusted advisor for top Fortune 500 corporations and the U.S. government.
Joseph is a researcher and industry thought leader. He speaks regularly at international conferences, writes for technical magazines, and is involved with developing training for various industry certifications. He invented the fictitious character of Emily Williams to create awareness around social engineering. Joseph runs The Security Blogger website, a popular resource for security and product implementation. He is the author and contributor of several publications including titles ranging from security best practices to exploitation tactics.
When Joseph is not using technology, you can find him on the fútbol (soccer) field or raising the next generation of hackers, also known as his children. Follow Joseph at https://www.thesecurityblogger.com and @SecureBlogger
„Über diesen Titel“ kann sich auf eine andere Ausgabe dieses Titels beziehen.
Gratis für den Versand innerhalb von/der USA
Versandziele, Kosten & DauerAnbieter: PBShop.store US, Wood Dale, IL, USA
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. DB-9780135619858
Anzahl: 3 verfügbar
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
PAP. Zustand: New. New Book. Shipped from UK. Established seller since 2000. Artikel-Nr. PB-9780135619858
Anzahl: 15 verfügbar
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
Zustand: New. In. Artikel-Nr. ria9780135619858_new
Anzahl: 2 verfügbar
Anbieter: Kennys Bookstore, Olney, MD, USA
Zustand: New. 2021. 1st Edition. Paperback. . . . . . Books ship from the US and Ireland. Artikel-Nr. V9780135619858
Anzahl: 2 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 752 pages. 9.00x7.00x1.50 inches. In Stock. Artikel-Nr. __0135619858
Anzahl: 2 verfügbar
Anbieter: moluna, Greven, Deutschland
Zustand: New. This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to de. Artikel-Nr. 267045841
Anzahl: 3 verfügbar
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
Paperback. Zustand: Brand New. 752 pages. 9.00x7.00x1.50 inches. In Stock. Artikel-Nr. zk0135619858
Anzahl: 1 verfügbar
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
Taschenbuch. Zustand: Neu. Neuware -This is the definitive, vendor-neutral guide to building, maintaining, and operating a modern Security Operations Center (SOC). Written by three leading security and networking experts, it brings together all the technical knowledge professionals need to deliver the right mix of security services to their organizations. The authors introduce the SOC as a service provider, and show how to use your SOC to integrate and transform existing security practices, making them far more effective. Writing for security and network professionals, managers, and other stakeholders, the authors cover:Pearson, St.-Martin-Straße 82, 81541 München 752 pp. Englisch. Artikel-Nr. 9780135619858
Anzahl: 2 verfügbar
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
Taschenbuch. Zustand: Neu. Neuware - The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC ServicesThis completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible.Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation.This guide will be indispensable for everyone responsible for delivering security services managers and cybersecurity professionals alike.Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technologyIdentify, recruit, interview, onboard, and grow an outstanding SOC teamThoughtfully decide what to outsource and what to insourceCollect, centralize, and use both internal data and external threat intelligenceQuickly and efficiently hunt threats, respond to incidents, and investigate artifactsReduce future risk by improving incident recovery and vulnerability managementApply orchestration and automation effectively, without just throwing money at themPosition yourself today for emerging SOC technologies. Artikel-Nr. 9780135619858
Anzahl: 1 verfügbar