|
|
|||
|
||||
OverviewModern security leaders face overwhelming challenges as they try to protect complex, hybrid enterprise environments while aligning with business goals and regulatory expectations. This book is written for CISOs, security architects, SOC leaders, risk and compliance officers, auditors, penetration testers, incident responders, and graduate students who already understand security fundamentals but struggle to translate theory into effective, scalable, and verifiable security programs. Readers often lack consolidated guidance that integrates governance, architecture, operations, emerging threats, and real-world frameworks into a single authoritative reference. This book addresses those pain points directly by providing a complete, industry aligned body of knowledge backed by verifiable sources and practical strategies. This resource brings together security governance, frameworks, architecture, risk management, SOC operations, incident response, cloud security, emerging technologies, and program management in a way that is easy to navigate and grounded in verified standards such as NIST, ISO, CIS Controls, COBIT, OWASP, and MITRE ATT&CK. Readers gain both strategic and operational clarity so they can design and execute programs that are defensible, measurable, and aligned with business outcomes. Key Benefits and Learning Outcomes Learn how to design and manage a comprehensive enterprise security program using real frameworks and authoritative sources. Gain practical, implementation ready guidance for cloud, architecture, SOC operations, incident response, IAM, DevSecOps, and more. Understand how to build risk based strategies aligned with NIST RMF, ISO 31000, and FAIR methodologies. Learn proven approaches for vulnerability management, threat intelligence, penetration testing, and red team operations. Explore verified case studies such as SolarWinds, Colonial Pipeline, and Equifax to understand real incident dynamics. Access step by step models, templates, mappings, and checklists ready for immediate use in the field. Stay ahead of the curve with authoritative coverage of AI security, Zero Trust, quantum safe cryptography, and emerging threats. The book expands across strategic, architectural, and operational domains to show how effective programs are built, executed, and improved over time. It connects business context with security controls and provides a structured, cross referenced body of knowledge that practitioners can trust. Every chapter includes verified sources, practical considerations, and implementation insights to help teams avoid common misconfigurations and compliance driven pitfalls. Whether you are building a new program or maturing an existing one, this book provides the depth and clarity needed to achieve measurable security outcomes. Full Product DetailsAuthor: Intelloqy PressPublisher: Independently Published Imprint: Independently Published Dimensions: Width: 21.60cm , Height: 2.80cm , Length: 27.90cm Weight: 1.234kg ISBN: 9798276145792Pages: 540 Publication Date: 25 November 2025 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |
||||