Détail de l'auteur
Auteur Dr. Erdal OZKAYA |
Documents disponibles écrits par cet auteur (4)
Ajouter le résultat dans votre panier Faire une suggestion Affiner la recherche
Titre : Cybersecurity Leadership Demystified Type de document : e-book Auteurs : Dr. Erdal OZKAYA Editeur : PACKT PUBLISHING Année de publication : 2022 ISBN/ISSN/EAN : 9781801819282 Note générale : copyrighted Langues : Anglais (eng) Résumé : Gain useful insights into cybersecurity leadership in a modern-day organization with the help of use casesKey FeaturesDiscover tips and expert advice from the leading CISO and author of many cybersecurity booksBecome well-versed with a CISO's day-to-day responsibilities and learn how to perform them with easeUnderstand real-world challenges faced by a CISO and find out the best way to solve themBook DescriptionThe chief information security officer (CISO) is responsible for an organization's information and data security. The CISO's role is challenging as it demands a solid technical foundation as well as effective communication skills. This book is for busy cybersecurity leaders and executives looking to gain deep insights into the domains important for becoming a competent cybersecurity leader.The book begins by introducing you to the CISO's role, where you'll learn key definitions, explore the responsibilities involved, and understand how you can become an efficient CISO. You'll then be taken through end-to-end security operations and compliance standards to help you get to grips with the security landscape. In order to be a good leader, you'll need a good team. This book guides you in building your dream team by familiarizing you with HR management, documentation, and stakeholder onboarding. Despite taking all that care, you might still fall prey to cyber attacks; this book will show you how to quickly respond to an incident to help your organization minimize losses, decrease vulnerabilities, and rebuild services and processes. Finally, you'll explore other key CISO skills that'll help you communicate at both senior and operational levels.By the end of this book, you'll have gained a complete understanding of the CISO's role and be ready to advance your career.What you will learnUnderstand the key requirements to become a successful CISOExplore the cybersecurity landscape and get to grips with end-to-end security operationsAssimilate compliance standards, governance, and security frameworksFind out how to hire the right talent and manage hiring procedures and budgetDocument the approaches and processes for HR, compliance, and related domainsFamiliarize yourself with incident response, disaster recovery, and business continuityGet the hang of tasks and skills other than hardcore security operationsWho this book is forThis book is for aspiring as well as existing CISOs. This book will also help cybersecurity leaders and security professionals understand leadership in this domain and motivate them to become leaders. A clear understanding of cybersecurity posture and a few years of experience as a cybersecurity professional will help you to get the most out of this book. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88923234 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=539035 Practical Cyber Threat Intelligence : Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices / Dr. Erdal OZKAYA / BPB Publications (2022)
Titre : Practical Cyber Threat Intelligence : Gather, Process, and Analyze Threat Actor Motives, Targets, and Attacks with Cyber Intelligence Practices Type de document : e-book Auteurs : Dr. Erdal OZKAYA Editeur : BPB Publications Année de publication : 2022 ISBN/ISSN/EAN : 9789355510297 Note générale : copyrighted Langues : Anglais (eng) Résumé : Knowing your threat actors together with your weaknesses and the technology will master your defenseKey Features? Gain practical experience with cyber threat intelligence by using the book's lab sections.? Improve your CTI skills by designing a threat intelligence system.? Assisting you in bridging the gap between cybersecurity teams.? Developing your knowledge of Cyber Intelligence tools and how to choose them.DescriptionWhen your business assets are threatened or exposed to cyber risk, you want a high-quality threat hunting team armed with cutting-edge threat intelligence to build the shield. Unfortunately, regardless of how effective your cyber defense solutions are, if you are unfamiliar with the tools, strategies, and procedures used by threat actors, you will be unable to stop them.This book is intended to provide you with the practical exposure necessary to improve your cyber threat intelligence and hands-on experience with numerous CTI technologies. This book will teach you how to model threats by gathering adversarial data from various sources, pivoting on the adversarial data you have collected, developing the knowledge necessary to analyse them and discriminating between bad and good information.The book develops and hones the analytical abilities necessary for extracting, comprehending, and analyzing threats comprehensively. The readers will understand the most common indicators of vulnerability that security professionals can use to determine hacking attacks or threats in their systems quickly. In addition, the reader will investigate and illustrate ways to forecast the scope of attacks and assess the potential harm they can cause.What you will learn? Hands-on experience in developing a powerful and robust threat intelligence model.? Acquire the ability to gather, exploit, and leverage adversary data.? Recognize the difference between bad intelligence and good intelligence.? Creating heatmaps and various visualization reports for better insights.? Investigate the most typical indicators of security compromise.? Strengthen your analytical skills to understand complicated threat scenarios better.Who this book is forThe book is designed for aspiring Cyber Threat Analysts, Security Analysts, Cybersecurity specialists, Security Consultants, and Network Security Professionals who wish to acquire and hone their analytical abilities to identify and counter threats quickly.Table of Contents1. Basics of Threat Analysis and Modeling2. Formulate a Threat Intelligence Model3. Adversary Data Collection Sources & Methods4. Pivot Off and Extracting Adversarial Data5. Primary Indicators of Security Compromise6. Identify & Build Indicators of Compromise7. Conduct Threat Assessments In Depth8. Produce Heat Maps, Infographics & Dashboards9. Build Reliable & Robust Threat Intelligence System10. Learn Statistical Approaches for Threat Intelligence11. Develop Analytical Skills for Complex Threats12. Planning for Disaster Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88937970 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=572856
Titre : Incident Response in the Age of Cloud Type de document : e-book Auteurs : Dr. Erdal OZKAYA Editeur : PACKT PUBLISHING Année de publication : 2021 ISBN/ISSN/EAN : 9781800569218 Note générale : copyrighted Langues : Anglais (eng) Résumé : Learn to identify a security incident and build a series of best practices to stop a cyberattack before it creates serious consequencesKey FeaturesDiscover Incident Response (IR), from its evolution to implementationUnderstand cybersecurity essentials and IR best practices through real-world phishing incident scenariosExplore the current challenges in IR through the perspectives of leading figures in the cybersecurity communityBook DescriptionCybercriminals are always in search of new methods and ways to infiltrate systems. Quickly responding to an incident should help an organization minimize its losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book provides updated IR processes to address the associated security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply this conceptual toolkit, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence, and the procedures involved in IR in the cloud – the challenges, opportunities, and how to secure your cloud environments. Finally, the book concludes with an “Ask the Experts” section where industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently. What you will learnUnderstand IR and its significanceOrganize an IR teamExplore best practices for managing attack situations with your IR teamForm, organize, and operate a product security team to deal with product vulnerabilities and assess their severityOrganize all the entities involved in product security responseRespond to a security vulnerability based on Keepnet Labs processes and practicesAdapt all the above learnings for the cloudWho this book is forThis book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology (IT) or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book.The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88910714 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=532886
Titre : Cybersecurity: The Beginner's Guide Type de document : e-book Auteurs : Dr. Erdal OZKAYA Editeur : PACKT PUBLISHING Année de publication : 2019 ISBN/ISSN/EAN : 9781789616194 Note générale : copyrighted Langues : Anglais (eng) Résumé : Understand the nitty-gritty of Cybersecurity with ease Key Features Align your security knowledge with industry leading concepts and tools Acquire required skills and certifications to survive the ever changing market needs Learn from industry experts to analyse, implement, and maintain a robust environment Book Description It's not a secret that there is a huge talent gap in the cybersecurity industry. Everyone is talking about it including the prestigious Forbes Magazine, Tech Republic, CSO Online, DarkReading, and SC Magazine, among many others. Additionally, Fortune CEO's like Satya Nadella, McAfee's CEO Chris Young, Cisco's CIO Colin Seward along with organizations like ISSA, research firms like Gartner too shine light on it from time to time. This book put together all the possible information with regards to cybersecurity, why you should choose it, the need for cyber security and how can you be part of it and fill the cybersecurity talent gap bit by bit. Starting with the essential understanding of security and its needs, we will move to security domain changes and how artificial intelligence and machine learning are helping to secure systems. Later, this book will walk you through all the skills and tools that everyone who wants to work as security personal need to be aware of. Then, this book will teach readers how to think like an attacker and explore some advanced security methodologies. Lastly, this book will deep dive into how to build practice labs, explore real-world use cases and get acquainted with various cybersecurity certifications. By the end of this book, readers will be well-versed with the security domain and will be capable of making the right choices in the cybersecurity field. What you will learn Get an overview of what cybersecurity is and learn about the various faces of cybersecurity as well as identify domain that suits you best Plan your transition into cybersecurity in an efficient and effective way Learn how to build upon your existing skills and experience in order to prepare for your career in cybersecurity Who this book is for This book is targeted to any IT professional who is looking to venture in to the world cyber attacks and threats. Anyone with some understanding or IT infrastructure workflow will benefit from this book. Cybersecurity experts interested in enhancing their skill set will also find this book useful. Nombre d'accès : Illimité En ligne : http://library.ez.neoma-bs.fr/login?url=https://www.scholarvox.com/book/88871054 Permalink : https://cataloguelibrary.neoma-bs.fr/index.php?lvl=notice_display&id=486548
LIBRARY - Campus Rouen
NEOMA Business School
pmb
-
59 Rue Taittinger, 51100 Reims
-
00 33 (0)3 26 77 46 15
Library Campus Reims
-
1 Rue du Maréchal Juin, BP 215
76825 Mont Saint Aignan cedex -
00 33 (0)2 32 82 58 26