102,77 €
114,19 €
-10% with code: EXTRA
Insider Threat
Insider Threat
102,77
114,19 €
  • We will send in 10–14 business days.
Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organizations builds an effective insider threat program. Read this book to learn: -The seven organizational characteristics common to insider threat victims. -Th…
114.19
  • Publisher:
  • ISBN-10: 1849288399
  • ISBN-13: 9781849288392
  • Format: 14 x 21.6 x 1.7 cm, minkšti viršeliai
  • Language: English
  • SAVE -10% with code: EXTRA

Insider Threat (e-book) (used book) | bookbook.eu

Reviews

Description

Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organizations builds an effective insider threat program. Read this book to learn: -The seven organizational characteristics common to insider threat victims. -The ten stages of a malicious attack. -The ten steps of a successful insider threat programme. -How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions. Insider Threat details the measures that organizations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more: -Risk mitigation and the eight steps of a risk assessment -The importance of training and awareness, and conducting staff background screening -Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviors -Metrics to measure insider threat behavior and mitigation -The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees) -Layering physical and digital defenses to provide defense in depth -The importance of conducting regular penetration testing to evaluate security controls -Limiting, monitoring and controlling remote access and mobile device use -Ensuring supply-chain security -Maintaining an incident management capability It also sets out what not to do, listing a set of worst practices that should be avoided.

EXTRA 10 % discount with code: EXTRA

102,77
114,19 €
We will send in 10–14 business days.

The promotion ends in 22d.07:06:10

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,14 Book Euros!?
  • Publisher:
  • ISBN-10: 1849288399
  • ISBN-13: 9781849288392
  • Format: 14 x 21.6 x 1.7 cm, minkšti viršeliai
  • Language: English English

Insider Threat - A Guide to Understanding, Detecting, and Defending Against the Enemy from Within looks beyond perimeter protection tools, and shows how a security culture based on international best practice can help mitigate the insider threat to your security. It also provides some short-term quick fixes that can be applied as your organizations builds an effective insider threat program. Read this book to learn: -The seven organizational characteristics common to insider threat victims. -The ten stages of a malicious attack. -The ten steps of a successful insider threat programme. -How to construct a three-tier security culture, encompassing artefacts, values and shared assumptions. Insider Threat details the measures that organizations can implement to ensure high-impact quick wins, mapping appropriate security controls from the ISO 27001, ISO 27002, and NIST SP 800-53 standards to the following points, and more: -Risk mitigation and the eight steps of a risk assessment -The importance of training and awareness, and conducting staff background screening -Monitoring and auditing the activities of general and privileged users, and quickly responding to suspicious behaviors -Metrics to measure insider threat behavior and mitigation -The challenge of external or temporary insiders (such as consultants, support contractors, partners, service providers, temporary employees) -Layering physical and digital defenses to provide defense in depth -The importance of conducting regular penetration testing to evaluate security controls -Limiting, monitoring and controlling remote access and mobile device use -Ensuring supply-chain security -Maintaining an incident management capability It also sets out what not to do, listing a set of worst practices that should be avoided.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)