top of page
Search
  • @CySec Professionals

CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE: Volume 1 - A Review

CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE: Volume 1 - Preparation, Threat Response, & Post-Incident Activity (Cybersecurity Masters Guide)


This book offers an in-depth exploration of incident management. It provides the reader with familiarity with the key terms and concepts associated with the discipline, and is an incredibly informative and descriptive read.



The author uses his experiences over his vast career to write knowledgeably about pertinent subject matter within the profession. It is evident from early-on that the author is both experienced and educated with industry certifications.


There are such a variety of vulnerabilities that organisations face, and a number of threats which have the potential to exploit these. You can use this book to create a proactive, well-informed approach to incident management. Too often, companies do the work once they have already been attacked. Preventative work is more beneficial. Most problems can be attributed to a specific cause, and many of these are also highlighted within the book. This gives an extra chance for the reader to ensure all processes are up to date and there are no additional vulnerabilities. The book does not shy away from technique guidance, including through valuable discussion around threat eradication.


It then builds on this when dealing with incident management. With key examples of the incident, the guide provides practical examples of action which should be taken. This is covers both the immediate tasks and those which will need to be done over time, and in preparation to deter against similar attempts in future. Beyond theory, this text continuously details how the practitioner can perform their role. It’s not just a job description, but there is frequent advice on how specific responsibilities can be met.


This comprehensive book offers evaluation of the technical, social and organisational aspects of incident management and the roles which surround it. The book provides a detailed, technical analysis but also goes far beyond this, and this is why the book still has much to offer even for those who are seasoned in the industry. It has information which will resonate with those who are fresh to the profession and those who are experienced, yet seeking best practice.


The book is clearly separated into the three labelled sections within the title and then within sub-sections of these detailed in the contents page. This means it reads well both as a comprehensive text to be read from start to finish, but also as a reference title that you can find quick questions to answers in, making it good to refer to time and time again. This also aids the reader in prioritisation of tasks. Whilst they may come away from reading this book with many ideas for improving current practice, they will also be able to construct a plan for this and may be working towards this for lengthy timescales.


Whether it is key indications of malicious activity, response readiness, or the potential risks of various methods of storage, this is a comprehensive guide which everyone can learn something from. This book offers the perfect before, during and after guide. The actions can be replicated and repeated, in order for you to hone your environment to lower vulnerabilities, but to manage incidents too.


Purchase your copy today on Amazon:

178 views0 comments
bottom of page