Book Image

The Cybersecurity Playbook for Modern Enterprises

By : Jeremy Wittkop
Book Image

The Cybersecurity Playbook for Modern Enterprises

By: Jeremy Wittkop

Overview of this book

Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow.
Table of Contents (15 chapters)
Section 1 – Modern Security Challenges
Section 2 – Building an Effective Program
Section 3 – Solutions to Common Problems

The three types of insider threats

Inside an organization, there are three basic human profiles. First, well-meaning insiders are people trusted by the organization to perform a function and are attempting to do so. Either for the sake of expediency or by error, those people can often expose the organization to unnecessary risk. Second, trusted insiders can become compromised through social engineering tactics, such as phishing, and someone outside the organization may be masquerading as them. These compromised accounts can lead to major data breaches and damage. Third, there are malicious insiders. These people are trusted and likely started as well-meaning insiders, but at some point became malicious. In some cases, the employees are bribed by outside actors. In other cases, they are frustrated by real or perceived slights by the organization. Regardless, their knowledge of the environment and privileges makes them very dangerous.

First, we will discuss well-meaning insiders...