See Yourself in Cyber Security Careers Beyond Hacking
A one-of-a-kind discussion of how to integrate cybersecurity into every facet of your organization In See Yourself in Cyber: Security Careers Beyond Hacking, information security strategist and educator Ed Adams delivers a unique and insightful discussion of the many different ways the people in you...
Autor principal: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Newark :
John Wiley & Sons, Incorporated
2024.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009811320506719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright Page
- Contents
- Part I The Many Colors of Cybersecurity
- Chapter 1 Introduction and Motivation
- How This Book Is Organized
- Who This Book Is For
- For Managers, Directors, Executives, and Other Business Leaders
- For Individuals Interested in Entering the Industry or Furthering Their Cybersecurity Career
- About the NICE Framework
- Summary
- Chapter 2 The Many Colors of Cybersecurity
- The NICE Framework and the Color Wheel
- Cybersecurity Jobs Not on the Color Wheel
- Sales
- Marketing
- Technical Support
- Customer Success
- Skills Needed for Jobs Not on the Color Wheel
- Challenges for All Jobs
- Summary
- Chapter 3 Primary Colors: Foundational Cybersecurity Work Roles
- Red: Analyze and Attack
- The Strategic Art of Red Teaming: Fortifying Cyber Defense Through Simulation
- Benefits of Red Teaming
- Red Team Work Roles That Align with NICE
- Other Red Team Roles
- A Red Wrap-Up
- Blue: Secure and Defend
- Blue Teaming: Preventing and Responding to Attacks
- Benefits of Blue Teaming
- Blue Team Work Roles That Align with NICE
- Other Blue Team Work Roles
- Blue Skies Ahead
- Yellow: Build and Maintain
- Introducing Yellow Teams
- The Yellow Team Paradox
- Yellow Team Work Roles
- Enabling Yellow Teams with a Security Mindset
- A Quick Word on Security Champions
- Key Functions of the Yellow Team
- Benefits of a Security-Minded Yellow Team
- Yellow Team Roles That Align with NICE
- Follow the Yellow Brick Road to Security
- Summary
- Chapter 4 Secondary Colors: Interdisciplinary Cybersecurity Work Roles
- Purple: The Evolution of Cyber Innovation
- Understanding Purple Teaming
- Dancing in the Purple Rain
- Industry Example of Purple Team Jobs
- The Cybersecurity Future Is Purple
- Orange and Green: Injecting the Builders with a Security Mindset.
- Orange: The Hulk's Approach to SysDev
- Green: It's Not That Easy Being Green
- Security Champions
- Summary
- Chapter 5 The Guiding Light: "White" Cybersecurity Work Roles from the Color Wheel
- Sniffing Out the Bakers
- CISO as Proxy for Cyber Staff
- Cybersecurity Law, Insurance, and Audit
- Cybersecurity Law
- Cybersecurity Insurance
- Cybersecurity Audit
- Summary
- Part II Cybersecurity Roles in Action
- Chapter 6 Software: The Catalyst of Today's Digital Enterprise
- Software's Ubiquitous Relevance to Cybersecurity
- Software-Defined Security
- Training for Software Security
- Software-Driven Security
- Software Is Unavoidable
- The Role of Artificial Intelligence in Cybersecurity
- Top AI Threats to Organizations
- Potential Security Benefits of AI
- Other AI-Specific Concerns
- The Cloud Is Software Too!
- Cloud Security Is Software Security
- Summary
- Chapter 7 The Power of Diversity and Inclusion in Cybersecurity: Safeguarding the Digital Frontier
- Defining Diversity and Inclusion in Cybersecurity
- Some Benefits of Diversity and Inclusion in Cybersecurity
- Drawbacks and Dangers of Homogeneous Workforces
- Underrepresentation in the Cybersecurity Industry
- Intersectionality and Multiple Marginalized Identities
- Efforts to Address Underrepresentation
- Achieving Diversity in the U.S. Cybersecurity Industry
- Addressing the Age Gap
- Aligning the Expectations
- Increasing Retention Rate
- An Open Discussion About Cybersecurity Diversity
- Promoting Inclusive Hiring Practices and Encouraging Educational Pathways
- Case Studies: Successful Diversity and Inclusion Programs
- Case Study 1: Do It with Love
- Case Study 2: Remove the Intimidation Factor
- Case Study 3: Ghanaian Grit
- Closing Thoughts on Building D&
- I Programs
- Summary
- Chapter 8 Straight from the Heart (of Cyber).
- Survey and Insights: Word on the Streets
- Summary of Key Findings
- Unsure Where to Start?
- Advice from Cybersecurity Practitioners
- Overcoming Challenges
- What Hiring Managers Look For
- Case Studies
- From Bakery to Badass
- From Shakespeare to SolarWinds
- From Pharmacy to Phishing
- From Sales and Marketing to Cyber SMEs
- Summary
- About the Author
- Index
- EULA.