Book Review: A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using



Grimes_Book.jpgExcellent book about InfoSec that has everything you need to know and nothing you don't.

A Data-Driven Computer Security Defense: THE Computer Security Defense You Should Be Using by Roger A. Grimes, available on Amazon in print and Kindle editions.

Roger is one of the IT Security Pros that I know and have admired for years. He has a no-nonsense approach to InfoSec and his years of experience are captured in this very valuable book. I strongly recommend you read it!

https://www.amazon.com/Data-Driven-Computer-Security-Defense-Should/dp/1549836536/

Foreword by Dr. Dorothy E. Denning, Emeritus Distinguished Professor, Department of Defense Analysis, Naval Postgraduate School

Today, most companies are either completely hacked or could easily be hacked. Things are so bad that most organizations are operating under an assumption of “Assume Breach”, and need to.

The truth is that most companies are not doing the right defenses in the right places and amounts against their biggest threats, making it far easier for hackers and malware than it needs to be.

Most organizations are highly inefficient at defending their computers, wasting resources (e.g. people, money, and time) solving the wrong problems. It doesn’t have to be this way. 

A Data-Driven Computer Security Defense describes what’s wrong with most traditional computer defenses, how they got that way, and how to fix it. It tells how to put the right remediations in the right places in the right amounts against the right things.

The theory is backed up by real life examples of what other companies have done to significantly strengthen their defenses. It is guaranteed that after you read A Data-Driven Computer Security Defense you’ll never think about computer defense the same way again.

Table of Contents

Part I – Bad Defenses

Chapter 1 - Introduction

Chapter 2 – How and Why Hackers Hack

Chapter 3 – Broken Defenses

Part II – A Better Data-Driven Defense

Chapter 4 – How to Fix a Broken Defense

Chapter 5 – Getting Better Data

Chapter 6 – Benefits of a Data-Driven Defense

Chapter 7 – Data-Driven Computer Security Defense Cycle

Part III – Implementing a Data-Driven Defense

Chapter 8 – Implementation Examples

Chapter 9 – How to Get From Here To There

Chapter 10 – Answers to Common Questions

Roger A. Grimes, CPA, CISSP, CEH, CISA, MCSE, yada, yada is a 30-year computer security professional and he has written 10 books and over 1000 national magazine articles on computer security. He is a frequent security conference speaker and is often interviewed by national magazines, news, radio, and television shows. He has been the InfoWorld/CSOOnline security columnist since 2005.

He has worked for or consulted with many of the world’s largest companies, utilities, and armed forces. He specializes in host security and preventing malware and hacker attacks.

Topics: Cybersecurity

Subscribe To Our Blog


ransomware-hostage-rescue-manual

Recent Posts




Get the latest about social engineering

Subscribe to CyberheistNews