The co-op bookstore for avid readers
Book Cover for: Agile Security Operations: Engineering for agility in cyber defense, detection, and response, Hinne Hettema

Agile Security Operations: Engineering for agility in cyber defense, detection, and response

Hinne Hettema

Get to grips with security operations through incident response, the ATT&CK framework, active defense, and agile threat intelligence


Key Features:

  • Explore robust and predictable security operations based on measurable service performance
  • Learn how to improve the security posture and work on security audits
  • Discover ways to integrate agile security operations into development and operations


Book Description:

Agile security operations allow organizations to survive cybersecurity incidents, deliver key insights into the security posture of an organization, and operate security as an integral part of development and operations. It is, deep down, how security has always operated at its best.

Agile Security Operations will teach you how to implement and operate an agile security operations model in your organization. The book focuses on the culture, staffing, technology, strategy, and tactical aspects of security operations. You'll learn how to establish and build a team and transform your existing team into one that can execute agile security operations. As you progress through the chapters, you'll be able to improve your understanding of some of the key concepts of security, align operations with the rest of the business, streamline your operations, learn how to report to senior levels in the organization, and acquire funding.

By the end of this Agile book, you'll be ready to start implementing agile security operations, using the book as a handy reference.


What You Will Learn:

  • Get acquainted with the changing landscape of security operations
  • Understand how to sense an attacker's motives and capabilities
  • Grasp key concepts of the kill chain, the ATT&CK framework, and the Cynefin framework
  • Get to grips with designing and developing a defensible security architecture
  • Explore detection and response engineering
  • Overcome challenges in measuring the security posture
  • Derive and communicate business values through security operations
  • Discover ways to implement security as part of development and business operations


Who this book is for:

This book is for new and established CSOC managers as well as CISO, CDO, and CIO-level decision-makers. If you work as a cybersecurity engineer or analyst, you'll find this book useful. Intermediate-level knowledge of incident response, cybersecurity, and threat intelligence is necessary to get started with the book.

Book Details

  • Publisher: Packt Publishing
  • Publish Date: Feb 17th, 2022
  • Pages: 254
  • Language: English
  • Edition: undefined - undefined
  • Dimensions: 9.25in - 7.50in - 0.53in - 0.97lb
  • EAN: 9781801815512
  • Categories: Internet - Online Safety & PrivacySecurity - Viruses & MalwareSystem Administration - Backup & Recovery

More books to explore

Book Cover for: Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World, Joseph Menn
Book Cover for: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World, Bruce Schneier
Book Cover for: The Art of Mac Malware, Volume 1: The Guide to Analyzing Malicious Software, Patrick Wardle
Book Cover for: This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, Nicole Perlroth
Book Cover for: The Werewolf at Dusk: And Other Stories, David Small
Book Cover for: The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime, Renee Dudley
Book Cover for: The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime, Renee Dudley
Book Cover for: Dark Territory: The Secret History of Cyber War, Fred Kaplan
Book Cover for: Don't Trust Your Gut: Using Data to Get What You Really Want in Life, Seth Stephens-Davidowitz
Book Cover for: The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data, Kevin Mitnick
Book Cover for: Where Wizards Stay Up Late: The Origins of the Internet, Katie Hafner

About the Author

Hettema, Hinne: - Hinne Hettema is a practitioner in cybersecurity operations, focusing especially on enabling security capabilities through detection engineering, security monitoring, threat intelligence, incident response, operational technology, and malware research. He works in New Zealand in security operations and the establishment of cybersecurity defensive capabilities in various organizations. He is an adjunct senior fellow at the University of Queensland, researching cybersecurity operations, the security of operational technology, and the philosophy of cybersecurity. He studied theoretical chemistry and philosophy.

More books by Hinne Hettema

Book Cover for: Certified Information Systems Security Professional (CISSP) Exam Guide: Master CISSP with hands-on bonus content and practical coverage of all eight e, Ted Jordan
Book Cover for: Principles for Cyber Security Operations, Hinne Hettema
Book Cover for: Reducing Chemistry to Physics: Limits, Models, Consequences, Hinne Hettema
Book Cover for: The Union of Chemistry and Physics: Linkages, Reduction, Theory Nets and Ontology, Hinne Hettema