On the other side of the Firewall
2024-6-12 02:1:44 Author: www.adainese.it(查看原文) 阅读量:15 收藏

Post cover

This book originates from the authors’ experience in conducting security incident simulations within companies. The scenarios described are always based on real cases, modified to make them unrecognizable while still usable as tabletop exercises.

The goal is to analyze the organization’s response to specific incidents, highlighting technical, organizational, and procedural difficulties and shortcomings.

The exercises are structured as dialogues between a CISO and their Mentor, dialogues that have actually taken place. The starting point involves a (fictional) company where the CISO works, envisioned as an international manufacturing company with a developed IT infrastructure primarily tied to SAP technologies and internal applications. The IT team is internal and relies on an outsourced SOC service.

On the other side of the Firewall

The workbook is divided into the following chapters:

  • Preface
  • Introduction
  • Scenario 1 - Vulnerability Management
  • Scenario 2 - Unauthorized Software Use
  • Scenario 3 - Foreign File
  • Scenario 4 - Access to Confidential Information
  • Scenario 5 - Double Extortion Attack
  • Conclusions

References


文章来源: https://www.adainese.it/blog/2024/06/11/on-the-other-side-of-the-firewall/
如有侵权请联系:admin#unsafe.sh