Threat Hunting in the Cloud

Threat Hunting in the Cloud
Author :
Publisher : John Wiley & Sons
Total Pages : 636
Release :
ISBN-10 : 9781119804109
ISBN-13 : 1119804108
Rating : 4/5 (108 Downloads)

Book Synopsis Threat Hunting in the Cloud by : Chris Peiris

Download or read book Threat Hunting in the Cloud written by Chris Peiris and published by John Wiley & Sons. This book was released on 2021-08-31 with total page 636 pages. Available in PDF, EPUB and Kindle. Book excerpt: Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cloud: Defending AWS, Azure and Other Cloud Platforms Against Cyberattacks, celebrated cybersecurity professionals and authors Chris Peiris, Binil Pillai, and Abbas Kudrati leverage their decades of experience building large scale cyber fusion centers to deliver the ideal threat hunting resource for both business and technical audiences. You'll find insightful analyses of cloud platform security tools and, using the industry leading MITRE ATT&CK framework, discussions of the most common threat vectors. You'll discover how to build a side-by-side cybersecurity fusion center on both Microsoft Azure and Amazon Web Services and deliver a multi-cloud strategy for enterprise customers. And you will find out how to create a vendor-neutral environment with rapid disaster recovery capability for maximum risk mitigation. With this book you'll learn: Key business and technical drivers of cybersecurity threat hunting frameworks in today's technological environment Metrics available to assess threat hunting effectiveness regardless of an organization's size How threat hunting works with vendor-specific single cloud security offerings and on multi-cloud implementations A detailed analysis of key threat vectors such as email phishing, ransomware and nation state attacks Comprehensive AWS and Azure "how to" solutions through the lens of MITRE Threat Hunting Framework Tactics, Techniques and Procedures (TTPs) Azure and AWS risk mitigation strategies to combat key TTPs such as privilege escalation, credential theft, lateral movement, defend against command & control systems, and prevent data exfiltration Tools available on both the Azure and AWS cloud platforms which provide automated responses to attacks, and orchestrate preventative measures and recovery strategies Many critical components for successful adoption of multi-cloud threat hunting framework such as Threat Hunting Maturity Model, Zero Trust Computing, Human Elements of Threat Hunting, Integration of Threat Hunting with Security Operation Centers (SOCs) and Cyber Fusion Centers The Future of Threat Hunting with the advances in Artificial Intelligence, Machine Learning, Quantum Computing and the proliferation of IoT devices. Perfect for technical executives (i.e., CTO, CISO), technical managers, architects, system admins and consultants with hands-on responsibility for cloud platforms, Threat Hunting in the Cloud is also an indispensable guide for business executives (i.e., CFO, COO CEO, board members) and managers who need to understand their organization's cybersecurity risk framework and mitigation strategy.


Threat Hunting in the Cloud Related Books

Threat Hunting in the Cloud
Language: en
Pages: 636
Authors: Chris Peiris
Categories: Computers
Type: BOOK - Published: 2021-08-31 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Implement a vendor-neutral and multi-cloud cybersecurity and risk mitigation framework with advice from seasoned threat hunting pros In Threat Hunting in the Cl
Threat Hunting with Elastic Stack
Language: en
Pages: 392
Authors: Andrew Pease
Categories: Computers
Type: BOOK - Published: 2021-07-23 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Learn advanced threat analysis techniques in practice by implementing Elastic Stack security features Key FeaturesGet started with Elastic Security configuratio
Incident Response in the Age of Cloud
Language: en
Pages: 623
Authors: Dr. Erdal Ozkaya
Categories: Computers
Type: BOOK - Published: 2021-02-26 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequences Key FeaturesDiscover Inc
Cybersecurity and Third-Party Risk
Language: en
Pages: 308
Authors: Gregory C. Rasner
Categories: Computers
Type: BOOK - Published: 2021-06-11 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

Move beyond the checklist and fully protect yourself from third-party cybersecurity risk Over the last decade, there have been hundreds of big-name organization
Practical Threat Intelligence and Data-Driven Threat Hunting
Language: en
Pages: 398
Authors: Valentina Costa-Gazcón
Categories: Computers
Type: BOOK - Published: 2021-02-12 - Publisher: Packt Publishing Ltd

DOWNLOAD EBOOK

Get to grips with cyber threat intelligence and data-driven threat hunting while exploring expert tips and techniques Key Features Set up an environment to cent