Book description
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In this practical guide, author Christina Morillo introduces technical knowledge from a diverse range of experts in the infosec field. Through 97 concise and useful tips, you'll learn how to expand your skills and solve common issues by working through everyday security problems.
You'll also receive valuable guidance from professionals on how to navigate your career within this industry. How do you get buy-in from the C-suite for your security program? How do you establish an incident and disaster response plan? This practical book takes you through actionable advice on a wide variety of infosec topics, including thought-provoking questions that drive the direction of the field.
- Continuously Learn to Protect Tomorrow's Technology - Alyssa Columbus
- Fight in Cyber Like the Military Fights in the Physical - Andrew Harris
- Keep People at the Center of Your Work - Camille Stewart
- Infosec Professionals Need to Know Operational Resilience - Ann Johnson
- Taking Control of Your Own Journey - Antoine Middleton
- Security, Privacy, and Messy Data Webs: Taking Back Control in Third-Party Environments - Ben Brook
- Every Information Security Problem Boils Down to One Thing - Ben Smith
- Focus on the WHAT and the Why First, Not the Tool - Christina Morillo
Publisher resources
Table of contents
- Preface
- 1. Continuously Learn to Protect Tomorrow’s Technology
- 2. Fight in Cyber like the Military Fights in the Physical
- 3. Three Major Planes
- 4. InfoSec Professionals Need to Know Operational Resilience
- 5. Taking Control of Your Own Journey
- 6. Security, Privacy, and Messy Data Webs: Taking Back Control in Third-Party Environments
- 7. Every Information Security Problem Boils Down to One Thing
- 8. And in This Corner, It’s Security Versus the Business!
- 9. Don’t Overlook Prior Art from Other Industries
- 10. Powerful Metrics Always Lose to Poor Communication
- 11. “No” May Not Be a Strategic Word
- 12. Keep People at the Center of Your Work
- 13. Take a Beat: Thinking Like a Firefighter for Better Incident Response
- 14. A Diverse Path to Better Security Professionals
- 15. It’s Not About the Tools
- 16. Four Things to Know About Cybersecurity
- 17. Vetting Resources and Having Patience when Learning Information Security Topics
- 18. Focus on the What and the Why First, Not the Tool
- 19. Insiders Don’t Care for Controls
- 20. Identity and Access Management: The Value of User Experience
- 21. Lessons from Cross-Training in Law
- 22. Ransomware
- 23. The Key to Success in Your Cloud Journey Begins with the Shared Responsibility Model
- 24. Why InfoSec Practitioners Need to Know About Agile and DevOps
- 25. The Business Is Always Right
- 26. Why Choose Linux as Your Secure Operating System?
- 27. New World, New Rules, Same Principles
- 28. Data Protection: Impact on Software Development
- 29. An Introduction to Security in the Cloud
- 30. Knowing Normal
- 31. All Signs Point to a Schism in Cybersecurity
- 32. DevSecOps Is Evolving to Drive a Risk-Based Digital Transformation
- 33. Availability Is a Security Concern Too
- 34. Security Is People
- 35. Penetration Testing: Why Can’t It Be Like the Movies?!
- 36. How Many Ingredients Does It Take to Make an Information Security Professional?
- 37. Understanding Open Source Licensing and Security
- 38. Planning for Incident Response Customer Notifications
- 39. Managing Security Alert Fatigue
- 40. Take Advantage of NIST’s Resources
- 41. Apply Agile SDLC Methodology to Your Career
- 42. Failing Spectacularly
- 43. The Solid Impact of Soft Skills
- 44. What Is Good Cyber Hygiene Within Information Security?
- 45. Phishing
- 46. Building a New Security Program
- 47. Using Isolation Zones to Increase Cloud Security
- 48. If It’s Remembered for You, Forensics Can Uncover It
- 49. Certifications Considered Harmful
- 50. Security Considerations for IoT Device Management
- 51. Lessons Learned: Cybersecurity Road Trip
- 52. Finding Your Voice
- 53. Best Practices with Vulnerability Management
- 54. Social Engineering
- 55. Stalkerware: When Malware and Domestic Abuse Coincide
- 56. Understanding and Exploring Risk
- 57. The Psychology of Incident Response
- 58. Priorities and Ethics/Morality
- 59. DevSecOps: Continuous Security Has Come to Stay
- 60. Cloud Security: A 5,000 Mile View from the Top
- 61. Balancing the Risk and Productivity of Browser Extensions
- 62. Technical Project Ideas Towards Learning Web Application Security
- 63. Monitoring: You Can’t Defend Against What You Don’t See
- 64. Documentation Matters
- 65. The Dirty Truth Behind Breaking into Cybersecurity
- 66. Cloud Security
- 67. Empathy and Change
- 68. Information Security Ever After
- 69. Don’t Check It In!
- 70. Threat Modeling for SIEM Alerts
- 71. Security Incident Response and Career Longevity
- 72. Incident Management
- 73. Structure over Chaos
- 74. CWE Top 25 Most Dangerous Software Weaknesses
- 75. Threat Hunting Based on Machine Learning
- 76. Get In Where You Fit In
- 77. Look Inside and See What Can Be
- 78. DevOps for InfoSec Professionals
- 79. Get Familiar with R&R (Risk and Resilience)
- 80. Password Management
- 81. Let’s Go Phishing
- 82. Vulnerability Management
- 83. Reduce Insider Risk Through Employee Empowerment
- 84. Fitting Certifications into Your Career Path
- 85. Phishing Reporting Is the Best Detection
- 86. Know Your Data
- 87. Don’t Let the Cybersecurity Talent Shortage Leave Your Firm Vulnerable
- 88. Comfortable Versus Confident
- 89. Some Thoughts on PKI
- 90. What Is a Security Champion?
- 91. Risk Management in Information Security
- 92. Risk, 2FA, MFA, It’s All Just Authentication! Isn’t It?
- 93. Things I Wish I Knew Before Getting into Cybersecurity
- 94. Research Is Not Just for Paper Writing
- 95. The Security Practitioner
- 96. Threat Intelligence in Two Steps
- 97. Maintaining Compliance and Information Security with Blue Team Assistance
- Contributors
- Index
- About the Editor
Product information
- Title: 97 Things Every Information Security Professional Should Know
- Author(s):
- Release date: September 2021
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098101398
You might also like
book
Foundations of Information Security
In this high-level survey of the information security field, best-selling author Jason Andress covers the basics …
book
ISC2 CISSP Certified Information Systems Security Professional Official Study Guide, 10th Edition
CISSP Study Guide - fully updated for the 2024 CISSP Body of Knowledge ISC2 Certified Information …
audiobook
(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition
(ISC)2 Certified Information Systems Security Professional (CISSP) Official Study Guide, 9th Edition has been completely updated …
book
Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents
Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in …