$28.71 with 56 percent savings
List Price: $64.99

The List Price is the suggested retail price of a new product as provided by a manufacturer, supplier, or seller. Except for books, Amazon will display a List Price if the product was purchased by customers on Amazon or offered by other retailers at or above the List Price in at least the past 90 days. List prices may not necessarily reflect the product's prevailing market price.
Learn more
Get Fast, Free Shipping with Amazon Prime FREE Returns
FREE delivery Monday, May 20 on orders shipped by Amazon over $35
In Stock
$$28.71 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$28.71
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Sold by
Amazon.com
Returns
30-day easy returns
30-day easy returns
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Returns
30-day easy returns
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Something went wrong. Please try your request again later.

Cybersecurity Incident Response: How to Contain, Eradicate, and Recover from Incidents 1st ed. Edition

4.3 4.3 out of 5 stars 16 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$28.71","priceAmount":28.71,"currencySymbol":"$","integerValue":"28","decimalSeparator":".","fractionalValue":"71","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"1torzljQkc%2BB46hd41QaAQOH4rbpNOABB8QJmVpvtuv0c0HXjncMm0M5FWVcMl9CxHfS0r4OqgZswItkbTce2YUj32LJoQaKecM3kEsABcm4LlZxAlOvkOiJHqNN57Sl%2BVl%2BZRuhoviVAAmWR3Iqug%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}]}

Purchase options and add-ons

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.

The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include:

  • Planning and practicing
  • Detection
  • Containment
  • Eradication
  • Post-incident actions

What You’ll Learn

  • Know the sub-categories of the NIST Cybersecurity Framework
  • Understand the components of incident response
  • Go beyond the incident response plan
  • Turn the plan into a program that needs vision, leadership, and culture to make it successful
  • Be effective in your role on the incident response team

Who This Book Is For

Cybersecurity leaders, executives, consultants, and entry-level professionals responsible for executing the incident response plan when something goes wrong

Read more Read less

Amazon First Reads | Editors' picks at exclusive prices

Frequently bought together

$28.71
Get it as soon as Monday, May 20
In Stock
Ships from and sold by Amazon.com.
+
$39.00
Get it May 21 - 23
Only 1 left in stock - order soon.
Ships from and sold by The Art of Savings.
Total price:
To see our price, add these items to your cart.
Details
Added to Cart
One of these items ships sooner than the other.
Choose items to buy together.

Editorial Reviews

From the Back Cover

Create, maintain, and manage a continual cybersecurity incident response program using the practical steps presented in this book. Don't allow your cybersecurity incident responses (IR) to fall short of the mark due to lack of planning, preparation, leadership, and management support.

Surviving an incident, or a breach, requires the best response possible. This book provides practical guidance for the containment, eradication, and recovery from cybersecurity events and incidents.

The book takes the approach that incident response should be a continual program. Leaders must understand the organizational environment, the strengths and weaknesses of the program and team, and how to strategically respond. Successful behaviors and actions required for each phase of incident response are explored in the book. Straight from NIST 800-61, these actions include:

  • Planning and practicing
  • Detection
  • Containment
  • Eradication
  • Post-incident actions

What You’ll Learn:

  • Know the sub-categories of the NIST Cybersecurity Framework
  • Understand the components of incident response
  • Go beyond the incident response plan
  • Turn the plan into a program that needs vision, leadership, and culture to make it successful
  • Be effective in your role on the incident response team

About the Author

Eric C. Thompson is an accomplished governance, risk, and compliance professional. In his GRC role as Director of Compliance at Blue Health Intelligence (BHI), Eric leads efforts to increase cyber security maturity in several domains, including governance, policy and controls, risk management, cyber security strategy, and business alignment. He established the risk management function which includes assessment, analysis and treatments of risks, threat and vulnerability management strategy, and due diligence requirements for assessing third-party risk. Eric also assesses cybersecurity technology capabilities and recommends enhancements to current solutions and new implementations that meet risk reduction requirements.

Prior to BHI, Eric spent seven years at Ernst & Young in the Advisory practice where he specialized in helping healthcare organizations (providers, payers, and business associates) solve problems related to information security, risk management, and compliance when dealing with electronic medical records. Eric led the HITRUST Common Security Framework (CSF) cybersecurity program management and third-party risk management assessments.

Eric is also a proud member of the SANS Mentor team.

Product details

  • Publisher ‏ : ‎ Apress; 1st ed. edition (September 21, 2018)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 191 pages
  • ISBN-10 ‏ : ‎ 1484238699
  • ISBN-13 ‏ : ‎ 978-1484238691
  • Item Weight ‏ : ‎ 12.3 ounces
  • Dimensions ‏ : ‎ 7.01 x 0.44 x 10 inches
  • Customer Reviews:
    4.3 4.3 out of 5 stars 16 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Eric C. Thompson
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Eric Thompson is an accomplished governance, risk and compliance professional. In his GRC role as the Director of Compliance at Blue Health Intelligence (BHI), Eric leads efforts to increase cyber security maturity in several domains including governance, policy and controls, risk management, cyber security strategy and business alignment. He established the risk management function which includes assessment, analysis and treatments of risks, threat and vulnerability management strategy and due diligence requirements for assessing third-party risk. Eric also assesses cybersecurity technology capabilities recommending enhancements to current solutions and new implementations that meet risk reduction requirements.

Prior to BHI, Eric spent seven years at Ernst & Young in the Advisory practice where he specialized in helping healthcare organizations (providers, payers and business associates) solve problems related to information security, risk management and compliance when dealing with electronic medical records. Eric lead HITRUST Common Security Framework (CSF) cybersecurity program management and third-party risk management assessments.

Eric is also a proud member of the SANS Mentor team.

Customer reviews

4.3 out of 5 stars
4.3 out of 5
16 global ratings

Top reviews from the United States

There are 0 reviews and 9 ratings from the United States

Top reviews from other countries

BR
1.0 out of 5 stars A Near Miss in itself...
Reviewed in the United Kingdom on November 24, 2019
A disappointing read. Most of the book is both obvious and available for free on the US NIST Cyber Security web site. The personal reflections add some residual value.
One person found this helpful
Report