1 option
Unified SecOps playbook : end-to-end enterprise security with Microsoft Sentinel, Defender XDR, and Security Copilot / Jose Lazaro, Marcus Burnap ; foreword by Rod Trent.
- Format:
- Book
- Author/Creator:
- Lázaro, José, author.
- Burnap, Marcus, author.
- Language:
- English
- Subjects (All):
- Computer security.
- Physical Description:
- 1 online resource
- Place of Publication:
- Birmingham : Packt Publishing, 2025.
- Summary:
- A practical guide to modern cybersecurity using Microsoft tools, covering step-by-step setup, Zero Trust AI integration, and security framework alignmentFree with your book: DRM-free PDF version + access to Packt's next-gen Reader* Key Features Deploy Microsoft Sentinel with end-to-end guidance, including CI/CD automation and scalable...
- Contents:
- Cover
- Title page
- Copyright and credits
- Foreword
- Contributors
- Table of Contents
- Preface
- Free Benefits with Your Book
- Chapter 1: Microsoft Defender XDR in the Age of Security Copilot
- Introduction to XDR: Embracing the future of cybersecurity
- Understanding XDR
- The role of AI in transforming the modern security landscape
- Overview of Microsoft's unified security approach and ecosystem
- The initiation of Security Copilot: AI-powered threat detection and response
- Future outlook
- Aligning with cybersecurity best practices
- Implementing a comprehensive cybersecurity framework
- Top 10 critical security controls for effective threat mitigation
- Adapting best practices to your organization's unique needs
- The CIA triad: A cornerstone of cybersecurity
- Applying the CIA triad to your security strategy
- Assessing your current security posture and the need for modern DevSecOps
- Conducting a security assessment and gap analysis
- Security assessment
- Gap analysis and benchmarking
- Identifying and prioritizing security risks and vulnerabilities
- Vulnerability management
- Building a strong vulnerability management program with Microsoft solutions
- Vulnerability assessment with Microsoft Defender Vulnerability Management
- Prioritizing vulnerabilities with Microsoft Secure Score
- Establishing a continuous vulnerability management program
- Creating an effective remediation process
- Developing a strategic roadmap for security enhancements with the Microsoft security stack
- Identity management: The first line of defense
- Embracing Zero Trust architecture
- Securing user endpoints
- Modern SecOps for a swift response
- Protecting data assets
- Securing applications against threats
- Infrastructure security for hybrid environments
- Enter DevOps and DevSecOps
- Integrating DevSecOps practices
- Key components of DevSecOps
- DevSecOps and Microsoft tools and services
- Embracing DevSecOps in your organization
- The Microsoft Security competitive advantage and Security Copilot
- The future of AI and Microsoft in cybersecurity
- Summary
- Chapter 2: Aligning with Cybersecurity Frameworks
- Essential cybersecurity frameworks
- National Institute of Standards and Technology Framework
- The five pillars of the NIST CSF
- Getting started with NIST CSF 2.0
- NCSC Cyber Assessment Framework (CAF)
- United Kingdom
- Benefits of NCSC CAF
- Adoption and implementation of NCSC CAF
- Cyber Essentials and Cyber Essentials Plus
- Cyber Essentials
- Cyber Essentials Plus
- ISO/IEC 27001
- The international gold standard for information security
- Controls in ISO/IEC 27001
- ISO/IEC 27001:2022 Annex A
- overview of controls
- The 10 Steps to cybersecurity
- General Data Protection Regulation (GDPR)
- The GDPR's implications for cybersecurity
- SOC 2
- The Center of Internet Security (CIS)
- Core components of CIS
- Controls and Benchmarks
- Notes:
- OCLC-licensed vendor bibliographic record.
- ISBN:
- 1-83763-286-3
- OCLC:
- 1553845292
- Publisher Number:
- CIPO000310551
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.