A la rentrée 2026, ScholarVox devient Cantook ScholarVox En savoir plus

Un produit ScholarVox CDI

Close Build, evaluate, and measure effective cybersecurity strategies using real-world threat intelligence and lessons from decades of enterprise defense experience.Key FeaturesApply data-driven strategies to protect, detect, and respond to modern cyber threatsEvaluate Zero Trust, attack-centric, and resilience strategies for enterprise defenseAddress ransomware, API abuse, cloud risks, and AI system securityPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionDesigning a cybersecurity strategy that actually works is difficult when threats evolve faster than budgets, teams, and tools. This book helps security leaders cut through noise by focusing on how organizations are compromised, which strategies succeed, and how to measure outcomes. Written by Tim Rains, a former Global Chief Security Advisor at Microsoft and senior security leader at AWS and Fortune-scale enterprises, this edition expands on the previous editions with major updates and new chapters. You will learn how threat intelligence, attack-centric security, intrusion kill chains, and MITRE ATT&CK can help defenders design stronger strategies. New and expanded content covers ransomware, API security, “living off the land” attacks, resilience as a cybersecurity strategy, and the security of AI systems alongside practical guidance on using AI to improve security outcomes. This book takes a practical, evidence-based approach to cybersecurity strategy, helping you assess trade-offs, avoid costly missteps, and communicate clearly with executives and boards. By the end of this book, you’ll be able to evaluate cybersecurity strategies more effectively, improve enterprise defenses, and communicate security priorities clearly to executives and boards.What you will learnIdentify common enterprise intrusion paths and reduce initial compromiseDistinguish credible threat intelligence from industry noiseImprove vulnerability management while reducing risk and costAssess malware, ransomware, and internet-based attack techniquesSecure APIs and reduce exposure from trusted enterprise toolsEvaluate Zero Trust and attack-centric security strategiesApply cloud, resilience, and AI capabilities to improve security outcomesHow governments request data and how enterprises manage access, risk, and oversightWho this book is forThis book is for CISOs, CSOs, security leaders, architects, and cybersecurity professionals responsible for strategy, risk reduction, and compliance in enterprise environments. Readers should have a basic understanding of IT, networking, and core cybersecurity concepts.

Cybersecurity Strategy for the AI-Driven Era

QRcode

Proven strategies and data-driven tactics to disrupt attacks and strengthen enterprise defenses

Build, evaluate, and measure effective cybersecurity strategies using real-world threat intelligence and lessons from decades of enterprise defense experience.Key FeaturesApply data-driven strategies to protect, detect, and respond to modern cyber threatsEvaluate Zero Trust, attack-centric, and resi

Voir toute la description...

Auteur(s): Rains, TimJones, Jeff

Editeur: Packt Publishing

Année de Publication: 2026

Nombre de pages: 800

Langue: lang_en

ISBN: 978-1-80602-857-3

eISBN: 978-1-80602-856-6

Build, evaluate, and measure effective cybersecurity strategies using real-world threat intelligence and lessons from decades of enterprise defense experience.Key FeaturesApply data-driven strategies to protect, detect, and respond to modern cyber threatsEvaluate Zero Trust, attack-centric, and resi

Voir toute la description...

Découvrez aussi...