We Need To Talk: 52 Weeks To Better Cyber-Security
()
About this ebook
The book provides a comprehensive approach to discussing cyber-security, addressing topics such as risk management, configuration management, vulnerability management, policy, threat intelligence, and incident response. The discussions that are sparked will lead to helping your team strengthen and mature your organization's security posture.
The book is designed for information security professionals and their teams looking for a structured way to improve their organization’s cyber-security posture over one year. It is an ideal resource for those teams who wish to develop a well-rounded understanding of cyber-security and gain insight into the various elements that are needed for a successful program.
*This book was written programmatically with the help of AI tools and edited using Grammarly.
Related to We Need To Talk
Related ebooks
CISO Starter Kit Rating: 0 out of 5 stars0 ratingsSelling Information Security to the Board: A Primer Rating: 0 out of 5 stars0 ratingsSecurity controls Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsInformation Security Governance: A Practical Development and Implementation Approach Rating: 0 out of 5 stars0 ratingsSoftware Development Security: CISSP, #8 Rating: 0 out of 5 stars0 ratingsCybersecurity Center A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity Risk: Cases Studies and Solutions Rating: 0 out of 5 stars0 ratingsThe EU Data Protection Code of Conduct for Cloud Service Providers: A guide to compliance Rating: 0 out of 5 stars0 ratingsCyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsFundamentals of Adopting the NIST Cybersecurity Framework Rating: 0 out of 5 stars0 ratingsInformation security Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsThe CISO Perspective: Understand the importance of the CISO in the cyber threat landscape Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 0 out of 5 stars0 ratingsCRISC Exam - Study Guide Rating: 4 out of 5 stars4/5IT Induction and Information Security Awareness: A Pocket Guide Rating: 0 out of 5 stars0 ratingsCybersecurity for Executives: A Guide to Protecting Your Business Rating: 0 out of 5 stars0 ratingsThe Secure CEO: How to Protect Your Computer Systems, Your Company, and Your Job Rating: 0 out of 5 stars0 ratingsEnterprise Security: A Data-Centric Approach to Securing the Enterprise Rating: 0 out of 5 stars0 ratingsCISM Certified Information Security Manager Exam Prep and Dumps ISACA CISM Exam Guidebook Updated Questions Rating: 0 out of 5 stars0 ratings7 Rules to Influence Behaviour and Win at Cyber Security Awareness Rating: 5 out of 5 stars5/5Agile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment Rating: 0 out of 5 stars0 ratingsSecuring Critical Infrastructures Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk Rating: 0 out of 5 stars0 ratingsVulnerability Scan Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsSecurity Operations: CISSP, #7 Rating: 0 out of 5 stars0 ratingsIT Security Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsSafeguarding the Digital Fortress: A Guide to Cyber Security: The IT Collection Rating: 0 out of 5 stars0 ratings
Security For You
CompTIA Security+ Study Guide with over 500 Practice Test Questions: Exam SY0-701 Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 4 out of 5 stars4/5Codes and Ciphers Rating: 5 out of 5 stars5/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Cybersecurity For Dummies Rating: 5 out of 5 stars5/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5CISM Certified Information Security Manager Study Guide Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide Rating: 3 out of 5 stars3/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Hack Like a GOD: Master the secrets of hacking through real-life hacking scenarios Rating: 4 out of 5 stars4/5CompTia Security 701: Fundamentals of Security Rating: 0 out of 5 stars0 ratingsThe Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsTor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5The Official (ISC)2 CCSP CBK Reference Rating: 0 out of 5 stars0 ratingsThe Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5IAPP CIPM Certified Information Privacy Manager Study Guide Rating: 0 out of 5 stars0 ratingsThe Darknet Superpack Rating: 0 out of 5 stars0 ratingsDestination CISSP Rating: 5 out of 5 stars5/5ISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5CompTIA CySA+ Study Guide: Exam CS0-003 Rating: 2 out of 5 stars2/5Dark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5
Reviews for We Need To Talk
0 ratings0 reviews
Book preview
We Need To Talk - L. Brent Huston
WEEK TWO
Best Practices Frameworks
QUESTIONS:
How are we doing with respect to best practices? Are there any areas where we need to focus more attention? Are there any areas that we should avoid? What best practice frameworks are we using across information security? How do we keep up with updates and changes? What kind of cross-training are we doing on frameworks?
Support Materials:
Information Security professionals often use best practice frameworks to help them understand how to implement various technologies and processes that will improve the overall effectiveness of their information security program. These frameworks provide a common language for discussing topics such as threat modeling, vulnerability management, access control, identity management, encryption, etc. They are also very effective at helping people who may need formal training in these areas to learn about them.
WEEK THREE
Security Policy
QUESTIONS:
Is there an official security policy document defining the organization's information security approach? Are those policies reviewed regularly? Has the organization ever been audited by a third party? If so, who did the audit, and what were their findings? Was anything changed as a result of the audit? Who on the team is responsible for writing and/or revising the policy documents? How are feedback and lessons learned throughout the enterprise woven into those updates? How are changes to our policies socialized across the company?
Support Materials:
Establishing, socializing, and keeping policies up to date are critical information security functions. Security policy documentation is crucial for many reasons. First, it provides a record of how you want your organization's information technology (IT) infrastructure to operate. Second, it helps IT staff understand the requirements that the various components of the IT infrastructure must meet. Third, it serves as a reminder of the security standards that must be followed at all times. Finally, it ensures that everyone understands the rules and regulations governing the use of the IT infrastructure.
WEEK FOUR
Relationships With Other Groups
QUESTIONS:
How are we working with other groups within the organization? Are there any areas where we need to collaborate more closely? Are there any areas that we should avoid collaborating with? Why? Are there any relationships that need to be clearly defined? Could those be clarified? Are there any areas where we need to clarify who owns what responsibilities?
Support Materials:
Relationships between different groups within an organization are critical to the success of information security programs. These relationships exist between IT and Security, Operations and Information Security, and even between the various departments within an organization. To effectively manage risks, it is necessary to understand how these relationships work together. For example, who will respond first if a server has a problem? Who has the authority to make decisions about the response? How does this impact the relationship between the two groups? Understanding these issues helps you build better relationships with your peers. Better relationships mean a more effective information security