TY - BOOK AU - Wittkop,Jeremy TI - The cybersecurity playbook for modern enterprises : : an end-to-end guide to preventing data breaches and cyber attacks / SN - 9781803248639 AV - HF5548.37 .W588 2022 U1 - 658.478 23 PY - 2022/// CY - Birmingham, UK : PB - Packt Publishing KW - Computer security. KW - Computer crimes KW - Prevention KW - Business KW - Data processing KW - Security measures N1 - Includes index; Section 1. Modern security challenges -- Protecting people, information, and systems - a growing problem -- The human side of cybersecurity -- Anatomy of an attack -- Section 2. Building an effective program -- Protecting people, information, and systems with timeless best practices -- Protecting against common attacks by partnering with end users -- Information security for a changing world -- Section 3. Solutions to common problems -- Difficulty securing the modern enterprise (with solutions) -- Harnessing automation opportunities -- Cybersecurity at home. N2 - "Learn how to build a cybersecurity program for a changing world with the help of proven best practices and emerging techniques. Security is everyone's responsibility and for any organization, the focus should be to educate their employees about the different types of security attacks and how to ensure that security is not compromised. This cybersecurity book starts by defining the modern security and regulatory landscape, helping you understand the challenges related to human behavior and how attacks take place. You'll then see how to build effective cybersecurity awareness and modern information security programs. Once you've learned about the challenges in securing a modern enterprise, the book will take you through solutions or alternative approaches to overcome those issues and explain the importance of technologies such as cloud access security brokers, identity and access management solutions, and endpoint security platforms. As you advance, you'll discover how automation plays an important role in solving some key challenges and controlling long-term costs while building a maturing program. Toward the end, you'll also find tips and tricks to keep yourself and your loved ones safe from an increasingly dangerous digital world. By the end of this book, you'll have gained a holistic understanding of cybersecurity and how it evolves to meet the challenges of today and tomorrow." ER -