Externally indexed torrent
If you are the original uploader, contact staff to have it moved to your account
Textbook in PDF format
What To Do When You Get Hacked: A Practitioner’s Guide to Incident Response in the 21st Century teaches you everything that you need to know about preparing your company for a potential data breach. We begin by talking about what the latest cybersecurity threats and attacks are that your company needs to be prepared for. Once we establish that, we go into the different phases of the incident response lifecycle based on the NIST framework. This will teach you how to properly prepare and respond to cybersecurity incidents so that you can be sure to minimize damage and fulfill all of your legal requirements during a cyberattack. This book is meant for the everyday business owner and makes these concepts simple to understand and apply.
Incident Reporting Mechanisms: You need an efficient method of reporting when an incident happens to the appropriate person. Ideally, it will be a mixture of automated and manual processes. For example, in Amazon Web Services (AWS), you can configure the environment with cloudwatch (an event monitoring tool) and their SNS services (notification service) to have alerts sent directly to administrators. You should configure your security tools to send alerts directly to incident handlers when certain events occur. Second, for the manual aspect team managers should know who to report an incident to if they think a security issue has occurred or there is an issue that may lead to one. This information can be reported via email, text, or phone call, especially in time-sensitive situations. NIST also recommends that at least one mechanism should permit people to report incidents anonymously, this is particularly important if someone wants to report fraud/insider threat activity.
What Is the Cybersecurity Epidemic?
What Am I Defending My Company from?
How to Get Started with Your Cybersecurity Program
Why Do You Need Cyber Insurance?
Compliance Regulations You Need to Be Aware of
How to Be Prepared for Insider Threats
How to Build an Effective Incident Response Team
How to Pitch for a Quality Cybersecurity Budget
Why You Need Continuous Security Validation
The Importance of Routine Simulations
The Six Steps to Preparing for a Cybersecurity Incident
How to Analyze a Potential Cybersecurity Incident
Steps to Containing a Cybersecurity Incident
How to Eradicate and Recover from a Cybersecurity Incident
What to Do If You Don’t Have the Internal Expertise You Need
How to Handle Third-Party Vendors That Have Suffered a Data Breach
How to Remove Data Leaks Once They Are on the Internet
How to Address the Public During a Data Breach
How to Handle Disgruntled Customers During a Data Breach
When Should I Get Law Enforcement Involved?
Public Authorities You Should Notify Throughout a Data Breach
Conclusion