|
|
|||
|
||||
OverviewSecurity vendors promise ""intelligent"" and ""autonomous"" SOCs. You're responsible for what actually happens when something goes wrong. If you lead or influence security operations-as a CISO, SOC manager, MSSP leader, security architect, or senior practitioner-you are caught between: Constant alert overload and limited staffing Complex, hybrid environments with gaps in telemetry and process Boards and regulators asking what AI is doing inside critical security functions You can't ignore AI and automation. But you also can't afford to deploy them blindly. Augmented Security Operations is a practical guide for cybersecurity leaders who want to use AI and automation to enhance security operations-without losing control of risk, transparency and trust. This book helps you: Understand what AI can realistically do in triage, investigations, threat hunting, CTI and reporting-today, not in theory. Apply a clear autonomy model for automation Design and enforce guardrails: preconditions, rate limits, kill switches, rollback plans and logging that keep automation safe and auditable. Get your data and telemetry into a shape where AI adds value instead of amplifying noise-identity, endpoint, cloud, network and context. Embed AI into existing workflows and tools, instead of creating yet another disconnected ""AI console."" Measure time savings, quality improvements and risk reduction with metrics that boards, customers and regulators will respect. Recognize and avoid common anti-patterns: ""AI first, data later"", ""big bang automation"", ""magic box vendors"" and ""shadow AI"". It is a book about building guardrailed, data-driven, AI-enabled security operations where: AI and automation handle the repetitive, noisy work Humans focus on judgment, context and high-impact decisions Leadership can explain-and defend-how AI is used in the SOC Whether you run a global 24×7 SOC, a regional MSSP, or a ""SOC of few"" in a mid-sized enterprise, Augmented Security Operations will show you how to turn AI and automation from marketing slogans into a controlled, measurable part of your operating model. Full Product DetailsAuthor: Jawed AhmadPublisher: Jawed Ahmad Imprint: Jawed Ahmad Dimensions: Width: 21.60cm , Height: 2.10cm , Length: 27.90cm Weight: 0.930kg ISBN: 9798902436119Pages: 404 Publication Date: 13 January 2026 Audience: General/trade , General Format: Paperback Publisher's Status: Active Availability: Available To Order We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately. Table of ContentsReviewsAuthor InformationJawed Ahmad is a cybersecurity executive and technology leader with 20+ years of experience helping organizations design, operate, and continuously improve secure systems at scale. His work spans security architecture, designing and managing Security Operations Centers (SOCs), security operations modernization, and the operationalization of AI monitoring and assurance across traditional machine learning, LLMs, retrieval-augmented generation (RAG), and agentic systems.Jawed brings a practitioner's perspective to emerging AI risk: translating security and governance requirements into measurable controls-SLOs, evidence-grade telemetry, evaluation pipelines, and threat-informed monitoring. He focuses on practical protection patterns that stand up in production, including techniques to reduce hallucinations, defend against prompt injection and jailbreak attempts, manage toxicity and harmful content, and prevent sensitive data leakage without sacrificing observability or compliance.He writes for security leaders, builders, and operators who need durable frameworks rather than hype. His books provide implementation-ready guidance-reference architectures, monitoring packs, runbooks, and decision templates-designed to help teams deploy trustworthy AI capabilities with confidence and accountability. Tab Content 6Author Website:Countries AvailableAll regions |
||||