网络安全桌面演练:从规划到执行
The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.
Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their organization’s incident response capabilities. This comprehensive guide to tabletop exercise planning and delivery offers practical insights, step-by-step instructions, and real-world examples to improve your team’s ability to prevent and respond to cyberattacks.
The book is divided into two main parts. In Part I: The Tabletop Exercise Process, you’ll learn • Why you should perform tabletop exercises and what their organizational benefits are • Effective planning and logistics tips, including how to gain executive sponsor support • How to develop realistic scenarios, injects, and storyboards • Facilitation techniques to ensure active participant engagement • Evaluation methods and follow-up activities
The example scenarios in Part II include • Technical tabletops covering phishing campaigns, ransomware attacks, and zero-day vulnerabilities • Executive-level exercises that focus on high-impact incidents • Cross-functional cases such as physical security breaches, social media compromises, and insider threats
With examples tailored for various roles, you’ll discover how to transform tabletop exercises from a mere compliance requirement into a powerful strategic preparedness tool. Whether you’re new to tabletop exercises or an experienced practitioner, this book provides proven insights to strengthen your organization’s cyber incident response capabilities and overall security posture.
完整的从开始到结束的指导,用于规划和执行成功的网络安全桌面演练。 由资深安全顾问罗伯特·莱勒斯基(Robert Lelewski)和约翰·霍尔尼贝尔格(John Hollenberger)撰写的《网络安全桌面演练》是一本必备资源,适用于所有希望提升其组织应急响应能力的安全专业人员。这份详尽的桌面演练规划与交付指南提供了实用见解、步骤说明以及真实的案例分析,以改善您的团队预防和应对网络攻击的能力。 本书分为两大部分。在第一部分:桌面演练流程中,您将学习到 • 为什么需要进行桌面演练及其组织效益 • 如何获得高级别支持并进行有效规划与物流管理的技巧 • 如何开发实际场景、注入点和故事板 • 促进参与者积极参与的指导技术 • 评估方法及后续活动 第二部分中的示例情景包括: • 技术性桌面演练,涵盖钓鱼攻击、勒索软件攻击以及零日漏洞 • 高级别执行型练习,专注于高影响事件 • 跨职能案例,如物理安全被破坏、社交媒体的妥协以及内部威胁等 通过针对不同角色定制的示例,您可以发现如何将桌面演练从一项合规性要求转变为一种强大的战略准备工具。无论您是否是桌面演练新手还是资深从业者,这本书都提供了经验证的见解,以增强组织的网络安全应急响应能力和整体安全态势。
本站不对文件进行储存,仅提供文件链接,请自行下载,本站不对文件内容负责,请自行判断文件是否安全,如发现文件有侵权行为,请联系管理员删除。
Wireless Communications for Power Substations: RF Characterization and Modeling
Projective Geometry: Solved Problems and Theory Review (True PDF,EPUB)
Kingship and Government in Pre-Conquest England c.500–1066
Numerical Algorithms with C
Mathematical Modelling Skills
The Art of Encouragement: How to Lead Teams, Spread Love, and Serve from the Heart (True PDF)
Principles of Cybersecurity
React in Depth (True/Retail EPUB)
The Complete Obsolete Guide to Generative AI (True/Retail EPUB)
IT-Forensik: Ein Grundkurs