A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisation.
▶Book Description
After scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more.
Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of.
The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them.
By the end of this book, you will know how to measure the effectiveness of your organization's cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself.
▶What You Will Learn
⦁Discover cybersecurity strategies and the ingredients critical to their success
⦁Improve vulnerability management by reducing risks and costs for your organization
⦁Learn how malware and other threats have evolved over the past decade
⦁Mitigate internet-based threats, phishing attacks, and malware distribution sites
⦁Weigh the pros and cons of popular cybersecurity strategies of the past two decades
⦁Implement and then measure the outcome of a cybersecurity strategy
⦁Learn how the cloud provides better security capabilities than on-premises IT environments
▶Key Features
⦁Protect your organization from cybersecurity threats with field-tested strategies
⦁Discover the most common ways enterprises initially get compromised
⦁Measure the effectiveness of your organization's current cybersecurity program against cyber attacks
▶Who This Book Is For
This book is designed to benefit engineers, leaders, or any professional with either a responsibility for cyber security within their organization, or an interest in working in this ever-growing field.
▶What this book covers
⦁ Chapter 1, Ingredients for a Successful Cybersecurity Strategy, provides a detailed look at the ingredients that are necessary for a successful cybersecurity program.
⦁ Chapter 2, Using Vulnerability Trends to Reduce Risk and Costs, provides a unique 20-year view of vulnerabilities, using vulnerability disclosure data from the National Vulnerability Database. This will help the reader more accurately evaluate the efficacy of cybersecurity strategies discussed in later chapters.
⦁ Chapter 3, The Evolution of the Threat Landscape – Malware, provides a unique data-driven perspective of how malware has evolved around the world over a 10 year period. This helps the reader understand the types of malware threats they face and which malware threats are most, and least, prevalent.
⦁ Chapter 4, Internet-Based Threats, examines some of the way's attackers have been using the internet and how these methods have evolved over time. This chapter dives into phishing attacks, drive-by download attacks and malware hosting sites.
⦁ Chapter 5, Cybersecurity Strategies, discusses the major cybersecurity strategies employed in the industry for the past 20 years or so. This chapter introduces the Cybersecurity Fundamentals Scoring System, which enables the reader to estimate an efficacy score for any cybersecurity strategy.
⦁ Chapter 6, Strategy Implementation, provides an example of how one of the best cybersecurity strategies identified can be implemented. This chapter illustrates how an Attack-Centric Strategy, namely the Intrusion Kill Chain, can be implemented.
⦁ Chapter 7, Measuring Performance and Effectiveness, looks at the challenge that CISOs and security teams have always had and how to measure the effectiveness of their cybersecurity program. This chapter examines how to measure the performance and effectiveness of a cybersecurity strategy.
⦁ Chapter 8, The Cloud – A Modern Approach to Security and Compliance, provides an overview of how the cloud is a great cybersecurity talent amplifier. This chapter looks at how the cloud can mitigate the ways enterprises typically get compromised. Additionally, this chapter dives into how security teams can use encryption and key management to protect data in the cloud.