|
![]() |
|||
|
||||
OverviewPlan and design robust security architectures to secure your organization's technology landscape and the applications you develop Key Features Leverage practical use cases to successfully architect complex security structures Learn risk assessment methodologies for the cloud, networks, and connected devices Understand cybersecurity architecture to implement effective solutions in medium-to-large enterprises Book DescriptionCybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization. With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs. By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.What you will learn Explore ways to create your own architectures and analyze those from others Understand strategies for creating architectures for environments and applications Discover approaches to documentation using repeatable approaches and tools Delve into communication techniques for designs, goals, and requirements Focus on implementation strategies for designs that help reduce risk Become well-versed with methods to apply architectural discipline to your organization Who this book is forIf you are involved in the process of implementing, planning, operating, or maintaining cybersecurity in an organization, then this security book is for you. This includes security practitioners, technology governance practitioners, systems auditors, and software developers invested in keeping their organizations secure. If you’re new to cybersecurity architecture, the book takes you through the process step by step; for those who already work in the field and have some experience, the book presents strategies and techniques that will help them develop their skills further. Full Product DetailsAuthor: Ed Moyle , Diana KelleyPublisher: Packt Publishing Limited Imprint: Packt Publishing Limited ISBN: 9781838989927ISBN 10: 1838989927 Pages: 418 Publication Date: 20 November 2020 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsReviewsAuthor InformationEd Moyle is a partner with SecurityCurve and Systems and Software Security Director for Taxwell. In his 25 years in information security, Ed has held numerous positions, including Director of Thought Leadership and Research for ISACA, Senior Security Strategist with Savvis, Senior Manager with CTG, and Vice President and Information Security Officer for Merrill Lynch Investment Managers. Ed is the co-author of Cryptographic Libraries for Developers and Practical Cybersecurity Architecture. He is a frequent contributor to the information security industry as an author, public speaker, and analyst Diana Kelley is CISO at Protect AI. She serves on the boards of WiCyS, the Executive Women's Forum, InfoSec World, and TechTarget Security. She was Cybersecurity Field CTO at Microsoft, Global Executive Security Advisor at IBM Security, GM at Symantec, VP at Burton Group, Manager at KPMG, and Chief vCISO at SaltCybersecurity. Her extensive volunteer work has included serving on the ACM Ethics & Plagiarism Committee, Cybersecurity Advisor at CompTIA, and the RSAC Program Committee. She hosts BrightTALK's The Security Balancing Act, co authored Practical Cybersecurity Architecture and Cryptographic Libraries for Developers, and teaches LinkedIn Learning Security in AI and ML. Her awards include EWF Executive of the Year and SCMedia Power Player. Tab Content 6Author Website:Countries AvailableAll regions |