Cybersecurity Threats, Malware Trends, and Strategies: Discover risk mitigation strategies for modern threats to your organization, 2nd Edition

Last Updated: December 27, 2023By Tags:


Price: $39.99
(as of Dec 27, 2023 00:43:59 UTC – Details)

Implement effective cybersecurity strategies to help you and your security team protect, detect, and respond to modern-day threats

Purchase of the print or Kindle book includes a free eBook in PDF format.

Key FeaturesProtect your organization from cybersecurity threats with field-tested strategiesUnderstand threats such as exploits, malware, internet-based threats, and governmentsMeasure the effectiveness of your organization’s current cybersecurity program against modern attackers’ tacticsBook Description

Tim Rains is Microsoft’s former Global Chief Security Advisor and Amazon Web Services’ former Global Security Leader for Worldwide Public Sector. He has spent the last two decades advising private and public sector organizations all over the world on cybersecurity strategies.

Cybersecurity Threats, Malware Trends, and Strategies, Second Edition builds upon the success of the first edition that has helped so many aspiring CISOs, and cybersecurity professionals understand and develop effective data-driven cybersecurity strategies for their organizations. In this edition, you’ll examine long-term trends in vulnerability disclosures and exploitation, regional differences in malware infections and the socio-economic factors that underpin them, and how ransomware evolved from an obscure threat to the most feared threat in cybersecurity. You’ll also gain valuable insights into the roles that governments play in cybersecurity, including their role as threat actors, and how to mitigate government access to data. The book concludes with a deep dive into modern approaches to cybersecurity using the cloud.

By the end of this book, you will have a better understanding of the threat landscape, how to recognize good Cyber Threat Intelligence, and how to measure the effectiveness of your organization’s cybersecurity strategy.

What you will learnDiscover enterprise cybersecurity strategies and the ingredients critical to their successImprove vulnerability management by reducing risks and costs for your organizationMitigate internet-based threats such as drive-by download attacks and malware distribution sitesLearn the roles that governments play in cybersecurity and how to mitigate government access to dataWeigh the pros and cons of popular cybersecurity strategies such as Zero Trust, the Intrusion Kill Chain, and othersImplement and then measure the outcome of a cybersecurity strategyDiscover how the cloud can provide better security and compliance capabilities than on-premises IT environmentsWho this book is for

This book is for anyone who is looking to implement or improve their organization’s cybersecurity strategy. This includes Chief Information Security Officers (CISOs), Chief Security Officers (CSOs), compliance and audit professionals, security architects, and cybersecurity professionals. Basic knowledge of Information Technology (IT), software development principles, and cybersecurity concepts is assumed.

Table of ContentsIntroductionWhat to Know About Threat IntelligenceUsing Vulnerability Trends to Reduce Risk and CostsThe Evolution of MalwareInternet-Based ThreatsThe Roles Governments Play in CybersecurityGovernment access to dataIngredients for a Successful Cybersecurity StrategyCybersecurity StrategiesStrategy ImplementationMeasuring Performance and EffectivenessModern Approaches to Security and Compliance

From the Publisher

Cybersecurity Threats, Malware Trends, and StrategiesCybersecurity Threats, Malware Trends, and Strategies

What’s new in the second edition?What’s new in the second edition?

What’s new in the second edition?

With four new chapters added, this updated edition is packed with new content! Because so many of the CISOs I have advised view governments as cybersecurity threats, two of the new chapters examine the roles that governments play in cybersecurity, as well as government access to data and how to mitigate it. There’s a new chapter on threat intelligence, as well as a section on the evolution of ransomware that will interest many cybersecurity professionals. Seeing that there’s so much interest in MITRE ATT&CK, I’ve also included insights on it.

codecode

Compared to previous editions, what is different about this edition?

This edition reflects many of the things I have learned about cybersecurity since writing the first edition almost three years ago. A lot has changed in that time, such as how ransomware has evolved, how governments are now widely viewed as threat actors, and the SolarWinds attack, to name a few. The first edition of this book was a great starting point that I’ve been able to add layers of new material to, which I think will help CISOs and security teams. The second edition provides CISOs with a bigger head start on developing an effective cybersecurity strategy for their organizations.

What are the key takeaways of this book?

This book is about cybersecurity strategy and how to inform strategy using credible threat intelligence and measuring performance in a pragmatic way. Some of the topics I dig into include:

How to identify credible threat intelligence versus all the hypeIngredients that help develop a successful cybersecurity strategyHow to optimize vulnerability management programs using threat intelligenceModern view of ransomwareHow to mitigate governments as threat actorsHow to measure the performance of a cybersecurity strategyHow to modernize cybersecurity strategies using the cloud

Tim Rains authorTim Rains author

What’s your favorite part of the book and why?

After spending years living in London and advising CISOs and security teams across Europe, the Middle East, and Africa, I can confidently say the most common risk CISOs in those regions are worried about is government access to data. Particularly, the US government access to data. I find it so interesting that, at the same time, CISOs in the US are largely oblivious to that concern. How can so many CISOs have such a different opinion about the same risk? Chapter 7, Government Access to Data, examines this contrast in great detail. It’s a new chapter and probably my favorite in the book, although it took me months to write.

Publisher ‏ : ‎ Packt Publishing; 2nd ed. edition (January 25, 2023)
Language ‏ : ‎ English
Paperback ‏ : ‎ 584 pages
ISBN-10 ‏ : ‎ 1804613673
ISBN-13 ‏ : ‎ 978-1804613672
Item Weight ‏ : ‎ 2.19 pounds
Dimensions ‏ : ‎ 7.5 x 1.32 x 9.25 inches

Leave A Comment