See Yourself in Cyber Security Careers Beyond Hacking

A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in you...

Descripción completa

Detalles Bibliográficos
Autor principal: Adams, Ed (-)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Newark : John Wiley & Sons, Incorporated 2024.
Edición:1st ed
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811320506719
Tabla de Contenidos:
  • Cover
  • Title Page
  • Copyright Page
  • Contents
  • Part I The Many Colors of Cybersecurity
  • Chapter 1 Introduction and Motivation
  • How This Book Is Organized
  • Who This Book Is For
  • For Managers, Directors, Executives, and Other Business Leaders
  • For Individuals Interested in Entering the Industry or Furthering Their Cybersecurity Career
  • About the NICE Framework
  • Summary
  • Chapter 2 The Many Colors of Cybersecurity
  • The NICE Framework and the Color Wheel
  • Cybersecurity Jobs Not on the Color Wheel
  • Sales
  • Marketing
  • Technical Support
  • Customer Success
  • Skills Needed for Jobs Not on the Color Wheel
  • Challenges for All Jobs
  • Summary
  • Chapter 3 Primary Colors: Foundational Cybersecurity Work Roles
  • Red: Analyze and Attack
  • The Strategic Art of Red Teaming: Fortifying Cyber Defense Through Simulation
  • Benefits of Red Teaming
  • Red Team Work Roles That Align with NICE
  • Other Red Team Roles
  • A Red Wrap-Up
  • Blue: Secure and Defend
  • Blue Teaming: Preventing and Responding to Attacks
  • Benefits of Blue Teaming
  • Blue Team Work Roles That Align with NICE
  • Other Blue Team Work Roles
  • Blue Skies Ahead
  • Yellow: Build and Maintain
  • Introducing Yellow Teams
  • The Yellow Team Paradox
  • Yellow Team Work Roles
  • Enabling Yellow Teams with a Security Mindset
  • A Quick Word on Security Champions
  • Key Functions of the Yellow Team
  • Benefits of a Security-Minded Yellow Team
  • Yellow Team Roles That Align with NICE
  • Follow the Yellow Brick Road to Security
  • Summary
  • Chapter 4 Secondary Colors: Interdisciplinary Cybersecurity Work Roles
  • Purple: The Evolution of Cyber Innovation
  • Understanding Purple Teaming
  • Dancing in the Purple Rain
  • Industry Example of Purple Team Jobs
  • The Cybersecurity Future Is Purple
  • Orange and Green: Injecting the Builders with a Security Mindset.
  • Orange: The Hulk's Approach to SysDev
  • Green: It's Not That Easy Being Green
  • Security Champions
  • Summary
  • Chapter 5 The Guiding Light: "White" Cybersecurity Work Roles from the Color Wheel
  • Sniffing Out the Bakers
  • CISO as Proxy for Cyber Staff
  • Cybersecurity Law, Insurance, and Audit
  • Cybersecurity Law
  • Cybersecurity Insurance
  • Cybersecurity Audit
  • Summary
  • Part II Cybersecurity Roles in Action
  • Chapter 6 Software: The Catalyst of Today's Digital Enterprise
  • Software's Ubiquitous Relevance to Cybersecurity
  • Software-Defined Security
  • Training for Software Security
  • Software-Driven Security
  • Software Is Unavoidable
  • The Role of Artificial Intelligence in Cybersecurity
  • Top AI Threats to Organizations
  • Potential Security Benefits of AI
  • Other AI-Specific Concerns
  • The Cloud Is Software Too!
  • Cloud Security Is Software Security
  • Summary
  • Chapter 7 The Power of Diversity and Inclusion in Cybersecurity: Safeguarding the Digital Frontier
  • Defining Diversity and Inclusion in Cybersecurity
  • Some Benefits of Diversity and Inclusion in Cybersecurity
  • Drawbacks and Dangers of Homogeneous Workforces
  • Underrepresentation in the Cybersecurity Industry
  • Intersectionality and Multiple Marginalized Identities
  • Efforts to Address Underrepresentation
  • Achieving Diversity in the U.S. Cybersecurity Industry
  • Addressing the Age Gap
  • Aligning the Expectations
  • Increasing Retention Rate
  • An Open Discussion About Cybersecurity Diversity
  • Promoting Inclusive Hiring Practices and Encouraging Educational Pathways
  • Case Studies: Successful Diversity and Inclusion Programs
  • Case Study 1: Do It with Love
  • Case Study 2: Remove the Intimidation Factor
  • Case Study 3: Ghanaian Grit
  • Closing Thoughts on Building D&amp
  • I Programs
  • Summary
  • Chapter 8 Straight from the Heart (of Cyber).
  • Survey and Insights: Word on the Streets
  • Summary of Key Findings
  • Unsure Where to Start?
  • Advice from Cybersecurity Practitioners
  • Overcoming Challenges
  • What Hiring Managers Look For
  • Case Studies
  • From Bakery to Badass
  • From Shakespeare to SolarWinds
  • From Pharmacy to Phishing
  • From Sales and Marketing to Cyber SMEs
  • Summary
  • About the Author
  • Index
  • EULA.