Cybersecurity Tabletop Exercises: From Planning to Execution 303127

Код товару: 303127Паперова книга
The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.

Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their organization’s incident response capabilities. This comprehensive guide to tabletop exercise planning and delivery offers practical insights, step-by-step instructions, and real-world examples to improve your team’s ability to prevent and respond to cyberattacks.

The book is divided into two main parts. In Part I: The Tabletop Exercise Process, you’ll learn:
  • Why you should perform tabletop exercises and what their organizational benefits are
  • Effective planning and logistics tips, including how to gain executive sponsor support
  • How to develop realistic scenarios, injects, and storyboards
  • Facilitation techniques to ensure active participant engagement
  • Evaluation methods and follow-up activities
The example scenarios in Part II include:
  • Technical tabletops covering phishing campaigns, ransomware attacks, and zero-day vulnerabilities
  • Executive-level exercises that focus on high-impact incidents
  • Cross-functional cases such as physical security breaches, social media compromises, and insider threats
With examples tailored for various roles, you’ll discover how to transform tabletop exercises from a mere compliance requirement into a powerful strategic preparedness tool. Whether you’re new to tabletop exercises or an experienced practitioner, this book provides proven insights to strengthen your organization’s cyber incident response capabilities and overall security posture.

About the Author
Robert Lelewski has more than 20 years of experience in IT, cybersecurity, incident response, and risk management. He is the VP of cybersecurity strategy at Zurich Insurance’s Global Ventures and holds numerous industry certifications, including CISA, CISM, CRISC, CIPM, and CDPSE.

John Hollenberger is a seasoned cybersecurity consultant with over 16 years of experience in web and host-based vulnerability assessments, incident response, digital forensics, and data loss prevention. He is a senior security consultant of proactive services at Fortinet, with certifications that include CISSP, GCIH, GWAPT, and Security+.
1'200 ₴
Купити
Monobank
до 10 платежей
от 135 ₴ / міс.
  • Нова Пошта
    Безкоштовно від 3'000,00 ₴
  • Укрпошта
    Безкоштовно від 1'000,00 ₴
  • Meest Пошта
    Безкоштовно від 3'000,00 ₴
Cybersecurity Tabletop Exercises: From Planning to Execution - фото 1
Інші книги No Starch Press

Характеристики

  • Бренд
  • Автор
  • Категорія
    Програмування
  • Рік
    2024
  • Сторінок
    200
  • Формат
    165х235 мм
  • Обкладинка
    М'яка
  • Тип паперу
    Офсетний
  • Мова
    Англійська
  • Ілюстрації
    Чорно-білі

Від видавця

The complete start-to-finish guide for planning and delivering successful cybersecurity tabletop exercises.

Cybersecurity Tabletop Exercises, written by veteran security consultants Robert Lelewski and John Hollenberger, is an essential resource for cybersecurity professionals and anyone tasked with enhancing their organization’s incident response capabilities. This comprehensive guide to tabletop exercise planning and delivery offers practical insights, step-by-step instructions, and real-world examples to improve your team’s ability to prevent and respond to cyberattacks.

The book is divided into two main parts. In Part I: The Tabletop Exercise Process, you’ll learn:
  • Why you should perform tabletop exercises and what their organizational benefits are
  • Effective planning and logistics tips, including how to gain executive sponsor support
  • How to develop realistic scenarios, injects, and storyboards
  • Facilitation techniques to ensure active participant engagement
  • Evaluation methods and follow-up activities
The example scenarios in Part II include:
  • Technical tabletops covering phishing campaigns, ransomware attacks, and zero-day vulnerabilities
  • Executive-level exercises that focus on high-impact incidents
  • Cross-functional cases such as physical security breaches, social media compromises, and insider threats
With examples tailored for various roles, you’ll discover how to transform tabletop exercises from a mere compliance requirement into a powerful strategic preparedness tool. Whether you’re new to tabletop exercises or an experienced practitioner, this book provides proven insights to strengthen your organization’s cyber incident response capabilities and overall security posture.

About the Author
Robert Lelewski has more than 20 years of experience in IT, cybersecurity, incident response, and risk management. He is the VP of cybersecurity strategy at Zurich Insurance’s Global Ventures and holds numerous industry certifications, including CISA, CISM, CRISC, CIPM, and CDPSE.

John Hollenberger is a seasoned cybersecurity consultant with over 16 years of experience in web and host-based vulnerability assessments, incident response, digital forensics, and data loss prevention. He is a senior security consultant of proactive services at Fortinet, with certifications that include CISSP, GCIH, GWAPT, and Security+.

Відгуки про Cybersecurity Tabletop Exercises: From Planning to Execution

Cybersecurity Tabletop Exercises: From Planning to Execution
Cybersecurity Tabletop Exercises: From Planning to Execution
1'200 ₴
Купити
Персонально для вас
The Android Malware Handbook: Detection and Analysis by Human and Machine
303137
Qian HanSalvador MandujanoSebastian Porst
900 ₴
Codebreaking: A Practical Guide
303140
Elonka DuninKlaus Schmeh
900 ₴
Основи кіберпростору, кібербезпеки та кіберзахисту
298522
Володимир БогушВолодимир БровкоВолодимир Настрадін
950 ₴
Grokking Web Application Security
277862
Malcolm McDonald
980 ₴
Spring Security in Action, Second Edition 2nd Edition
276052
Laurentiu Spilca
1'100 ₴
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
303162
Fotios ChantzisIoannis StaisPaulino CalderonEvangelos DeirmentzoglouBeau Woods
1'100 ₴
Linux Basics for Hackers, 2nd Edition
303136
OccupyTheWeb
1'200 ₴
The Hardware Hacking Handbook: Breaking Embedded Security with Hardware Attacks
303258
Jasper van WoudenbergColin O'Flynn
1'200 ₴
Cryptography and Cryptanalysis in Java. 1st Ed.
244673
Stefania Loredana Nita, Marius Iulian Mihailescu
1'500 ₴
Snowflake Security: Securing Your Snowflake Data Cloud. 1st Ed.
244728
Ben Herzberg, Yoav Cohen
1'500 ₴
Deep Learning: Foundations and Concepts 2024th Edition
292939
Hugh BishopChris Bishop
2'400 ₴
Radical Therapy for Software Development Teams: Lessons in Remote Team Management and Positive Motivation 1st ed. Edition
308848
Gregory LindMaryna Mishchenko
1'700 ₴
MLOps with Ray: Best Practices and Strategies for Adopting Machine Learning Operations First Edition
281515
Hien LuuZhe ZhangMax Pumperla
1'700 ₴
Game Engine Black Book: Doom
89525
Fabien Sanglard
2'640 ₴
The Art of Mac Malware, Volume 2: Detecting Malicious Software
302607
Patrick Wardle
2'100 ₴
A Gamer's Introduction to Programming in C#: Welcome Brave Adventurer! 1st Edition
284241
Aaron Langille
2'600 ₴
Professional C++ (Tech Today) 6th Edition
286402
Marc Gregoire
2'400 ₴
Quantum Computing in Action
265873
Johan Vos
1'200 ₴
Real World OCaml Functional programming for the masses
13631
Yaron Minsky, Anil Madhavapeddy, Jason Hickey
600 ₴