-
Book Overview & Buying
-
Table Of Contents
Agile Security Operations
By :
In Chapter 1, How Security Operations Are Changing, and Chapter 2, Incident Response – A Key Capability in Security Operations, we argued that security operations are at the core of a security program, and that incident response is at the core of security operations. Moreover, we argued that an agile framework is preferred for both security operations and incident response, and we made a proposal for such a framework.
However, incidents are often confusing for the handler, with competing data, interpretations of data, and a multitude of events to analyze. The relatively static models of the life cycle are sometimes difficult to apply in these circumstances. Hence, in this chapter, we will widen the scope of our skillset to include tools that offer a broader perspective.
Cybersecurity is rife with military acronyms, unhelpful analogies, and failed models for defense. The problem is that most of the time, the key concepts of cyber...
Change the font size
Change margin width
Change background colour