The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks

The Cybersecurity Playbook for Modern Enterprises: An end-to-end guide to preventing data breaches and cyber attacks

English | 2022 | ISBN: 978-1803248639 | 280 Pages | PDF, EPUB | 10 MB

Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques

Key Features

  • Understand what happens in an attack and build the proper defenses to secure your organization
  • Defend against hacking techniques such as social engineering, phishing, and many more
  • Partner with your end user community by building effective security awareness training programs

Security is everyone’s responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised.

This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You’ll then see how to build effective cybersecurity awareness and modern information security programs. Once you’ve learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you’ll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you’ll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world.

By the end of this book, you’ll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow.

What you will learn

  • Understand the macro-implications of cyber attacks
  • Identify malicious users and prevent harm to your organization
  • Find out how ransomware attacks take place
  • Work with emerging techniques for improving security profiles
  • Explore identity and access management and endpoint security
  • Get to grips with building advanced automation models
  • Build effective training programs to protect against hacking techniques
  • Discover best practices to help you and your family stay safe online
Homepage