Acknowledgments |
|
xiii | |
About the Author |
|
xv | |
|
1 Introduction -- The CISO |
|
|
1 | (68) |
|
|
1 | (5) |
|
|
6 | (1) |
|
|
7 | (4) |
|
The Role of the Chief Information Officer (CIO) |
|
|
11 | (3) |
|
|
14 | (1) |
|
The Key Differences between the vCISO and the CISO |
|
|
14 | (1) |
|
The Benefits of the vCISO |
|
|
15 | (3) |
|
|
18 | (1) |
|
|
18 | (2) |
|
|
20 | (2) |
|
|
22 | (1) |
|
|
23 | (1) |
|
Cyber Risk and Cyber Resiliency |
|
|
23 | (1) |
|
|
23 | (2) |
|
How to Manage Cybersecurity Risk |
|
|
25 | (2) |
|
Introduction -- What Exactly Is Cyber Resiliency? |
|
|
27 | (1) |
|
An Example of Cyber Resiliency |
|
|
27 | (1) |
|
How the Definition of Cyber Resiliency Was Met |
|
|
28 | (1) |
|
What Is the Difference between Cyber Resiliency and Cyber Security? |
|
|
29 | (1) |
|
The NIST Special Publication 800-160 Volume 2 |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
31 | (1) |
|
Top Five Tips to Avoid a Data Breach |
|
|
32 | (2) |
|
Internal Fraud Prevention |
|
|
34 | (1) |
|
How to Avoid Internal Fraud |
|
|
34 | (3) |
|
Identity and Access Management |
|
|
37 | (1) |
|
Biometrics and Identity Management |
|
|
38 | (1) |
|
|
38 | (1) |
|
What Biometrics Is All About |
|
|
38 | (1) |
|
How Biometrics Can Confirm Your Identity |
|
|
39 | (1) |
|
Biometrics as a Replacement to the Password |
|
|
40 | (3) |
|
An Introduction to the Zero Trust Framework |
|
|
43 | (1) |
|
|
43 | (1) |
|
What Exactly Is Zero Trust? |
|
|
43 | (1) |
|
How to Implement the Zero Trust Framework |
|
|
44 | (3) |
|
The Advantages of the Zero Trust Framework |
|
|
47 | (2) |
|
Third-Party and Vendor Risk Management |
|
|
49 | (1) |
|
How to Manage Third-Party Risk |
|
|
50 | (1) |
|
|
50 | (1) |
|
The Types of Third-Party Risks |
|
|
50 | (2) |
|
How to Manage Third-Party Risks |
|
|
52 | (1) |
|
The Importance of Vendor Compliance Management |
|
|
53 | (1) |
|
|
53 | (1) |
|
What Is Vendor Compliance? |
|
|
54 | (1) |
|
|
55 | (2) |
|
Investigations and Forensics |
|
|
57 | (1) |
|
The Use of Artificial Intelligence in Digital Forensics |
|
|
57 | (1) |
|
|
58 | (2) |
|
|
60 | (1) |
|
Understanding IT Governance, Risk, and Compliance |
|
|
60 | (1) |
|
|
60 | (1) |
|
What Exactly Do They Mean? |
|
|
61 | (2) |
|
Other Factors That Keep the CISO Up at Night |
|
|
63 | (3) |
|
What the CISO Can Do to Improve the Odds of Tenure |
|
|
66 | (1) |
|
|
67 | (1) |
|
|
68 | (1) |
|
|
69 | (28) |
|
What Should I Focus My Business On? |
|
|
71 | (4) |
|
Choosing the Legal Business Entity |
|
|
75 | (1) |
|
The Different Kinds of Entities |
|
|
75 | (2) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
|
81 | (6) |
|
Establishing Payment Terms and Hiring Employees |
|
|
87 | (1) |
|
|
87 | (2) |
|
|
89 | (1) |
|
Do I Need a Brick-and-Mortar Presence? |
|
|
90 | (1) |
|
The Financial Components of the Business Plan |
|
|
91 | (1) |
|
The Profit and Loss Statement |
|
|
91 | (2) |
|
|
93 | (2) |
|
|
95 | (1) |
|
|
96 | (1) |
|
3 Launching the Threat-Hunting Business |
|
|
97 | (40) |
|
|
97 | (1) |
|
A Formal Definition of Proactive Threat Hunting |
|
|
98 | (3) |
|
The Process of Proactive Threat Hunting and Its Components |
|
|
101 | (2) |
|
Hiring Your Threat Hunting Team |
|
|
103 | (1) |
|
|
104 | (5) |
|
|
104 | (1) |
|
|
104 | (1) |
|
|
105 | (1) |
|
|
105 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
|
108 | (1) |
|
|
109 | (6) |
|
|
109 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
112 | (1) |
|
|
112 | (1) |
|
|
113 | (1) |
|
|
113 | (1) |
|
|
114 | (1) |
|
|
114 | (1) |
|
|
115 | (6) |
|
|
115 | (1) |
|
|
116 | (1) |
|
|
116 | (1) |
|
|
117 | (1) |
|
|
117 | (1) |
|
|
118 | (1) |
|
|
119 | (1) |
|
|
119 | (1) |
|
|
120 | (1) |
|
|
120 | (1) |
|
The Characteristics of a Good Threat Hunter |
|
|
121 | (3) |
|
The Value of a Good Threat Hunter |
|
|
124 | (2) |
|
Launching the Threat Hunting Exercise |
|
|
126 | (1) |
|
The Risk Assessment -- What Needs to Be Examined |
|
|
126 | (3) |
|
Determining What to Hunt For and How Often |
|
|
129 | (2) |
|
Launching the Threat Hunting Remediation Exercise |
|
|
131 | (2) |
|
Determining the Effectiveness of the Threat Hunting Exercise |
|
|
133 | (2) |
|
|
135 | (2) |
|
4 Staying Ahead of the Competition |
|
|
137 | (14) |
|
|
137 | (7) |
|
The Different Ways to Prepare for a Cybersecurity Certification |
|
|
144 | (1) |
|
Be On Top of the Hiring Curve |
|
|
145 | (1) |
|
|
146 | (1) |
|
|
147 | (3) |
|
|
150 | (1) |
Index |
|
151 | |