Analyst & Research Reports

O'Reilly Modern Defense in Depth

Issue link:

Contents of this Issue


Page 8 of 53

be implemented today, often with the current security technologies you already have in place. The Audience for this Book This book is designed to help those who are in the role of cyberse‐ curity management, given that you are ultimately responsible for protecting your networks, your internal user communities, your public-facing web applications, and your data from the cyberthreats you face daily. This book is directed at chief security officers (CSOs), chief information security officers (CISOs), security directors, secu‐ rity managers, and other similar roles. What You Will Learn In this book, I highlight the security technologies that are currently deployed and how they're deployed, so you can recognize the short‐ comings when presently trying to protect internal users and public- facing web applications from cyberattacks. I expose the deficiencies in the currently accepted definition of DiD within the context of cybersecurity to help you realize that a better model exists. Then, I demonstrate what's needed today to fully protect public-facing web applications so that you can learn how to best protect them within the context of the cloud. Following that, I help you understand the available options to fully integrate the security technologies deployed while exploring the pros and cons of in-house-versus- outsourced security operations centers (SOCs). And finally, I paint a picture of what steps you can take to "intelligently integrate" your security approaches in the context of automation and supervised machine learning. Preface | vii

Articles in this issue

view archives of Analyst & Research Reports - O'Reilly Modern Defense in Depth