Modern Vulnerability Management : predictive cybersecurity / Michael Roytman and Ed Bellis.
Material type:
TextSeries: Computer SecurityPublication details: Boston: London: Artech House, 2023.Description: 216 Pages; 23 cmISBN: - 9781630819385
- QA76.9 .A25 R892 2023
| Item type | Current library | Collection | Call number | Copy number | Status | Notes | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Rabdan Academy General Stacks | General Collection | QA76.9 .A25 R892 2023 (Browse shelf(Opens below)) | C. 1 | Available | AED 289.00 | 23591 |
Browsing Rabdan Academy shelves,Shelving location: General Stacks,Collection: General Collection Close shelf browser (Hides shelf browser)
|
|
|
|
|
|
|
||
| QA76.9 .A25 P923 2023 Predictive Data Security using AI : insights and issues of blockchain, IoT, and DevOps / | QA76.9 .A25 P923 2023 Predictive Data Security using AI : insights and issues of blockchain, IoT, and DevOps / | QA76.9 .A25 R456 2021 The Art of Attack : attacker mindset for security professionals / | QA76.9 .A25 R892 2023 Modern Vulnerability Management : predictive cybersecurity / | QA76.9 .A25 S43 2021 Protective Security: Creating military - grade defenses for your digital business / | QA76.9 .A25 S446 2022 Security and Resilience of Control Systems : theory and applications / | QA76.9 .A25 S558 2021 The Politics of Cybersecurity in the Middle East / |
This book comprehensively covers the principles of Risk-based vulnerability management (RBVM) - one of the most challenging tasks in cybersecurity -- from the foundational mathematical models to building your own decision engine to identify, mitigate, and eventually forecast the vulnerabilities that pose the greatest threat to your organization. You will learn: how to structure data pipelines in security and derive and measure value from them; where to procure open-source data to better your organization's pipeline and how to structure it; how to build a predictive model using vulnerability data; how to measure the return on investment a model in security can yield; which organizational structures and policies work best, and how to use data science to detect when they are not working in security; and ways to manage organizational change around data science implementation. You'll also be shown real-world examples of how to mature an RBVM program and will understand how to prioritize remediation efforts based on which vulnerabilities pose the greatest risk to your organization. The book presents a fresh approach, rooted in risk management, and taking advantage of rich data and machine learning, helping you focus more on what matters and ultimately make your organization more secure with a system commensurate to the scale of the threat. This is a timely and much-needed book for security managers and practitioners who need to evaluate their organizations and plan future projects and change. Students of cybersecurity will also find this a valuable introduction on how to use their skills in the enterprise workplace to drive change.
There are no comments on this title.