Everyone talks about the intrusion kill chain (sometimes called the cyber kill chain)—a model for actionable intelligence in which defenders align enterprise defensive capabilities to the specific processes an adversary undertakes to target that enterprise—but much of what is said is misinformation and scare tactics.
Amanda Berlin explores the most effective steps you can take to protect your organization from the vast majority of threats with defensive mitigation and monitoring, covering use cases such as ransomware, web server vulnerabilities, shadow IT, data exfiltration, and lateral movement to demonstrate how to improve the standard of defense at each level. Amanda concludes with tabletop exercises and drills to strengthen your understanding.
Amanda Berlin is an information security architect for NetWorks Group, a consulting firm in northern Ohio. Amanda has spent over a decade in technology, providing infrastructure support, triage, and design for a range of clients. Some of her successes include implementing a secure payment card industries (PCI) process and Health Insurance Portability and Accountability Act (HIPAA) compliance and building a comprehensive phishing and awards-based user education program. Amanda is the author of the blue team best practices guide Defensive Security Handbook: Best Practices for Securing Infrastructure (O’Reilly) and a cohost of the Brakeing Down Security podcast. She also writes for several blogs.
©2017, O'Reilly Media, Inc. • (800) 889-8969 or (707) 827-7019 • Monday-Friday 7:30am-5pm PT • All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners. • firstname.lastname@example.org