Search

Categories

    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss
    • categories-img Jacket, Women
    • categories-img Woolend Jacket
    • categories-img Western denim
    • categories-img Mini Dresss

Filter By Price

$
-
$

Dietary Needs

Top Rated Product

product-img product-img

Modern Chair

$165.00
product-img product-img

Plastic Chair

$165.00
product-img product-img

Design Rooms

$165.00

Brands

  • Wooden
  • Chair
  • Modern
  • Fabric
  • Shoulder
  • Winter
  • Accessories
  • Dress

Welcome and thank you for visiting us. For any query call us on 0799 626 359 or Email [email protected]

Offcanvas Menu Open

Shopping Cart

Africa largest book store

Sub Total:

Search for any Title

Cybersecurity Tabletop Exercises : From Planning to Execution

By: (Author) John Hollenberger , (Author) Robert Lelewski

Extended Catalogue

Ksh 10,250.00

Format: Paperback / Softback

ISBN-10: 1718503822

ISBN-13: 9781718503823

Publisher: No Starch Press,US

Imprint: No Starch Press,US

Country of Manufacture: US

Country of Publication: GB

Publication Date: Oct 29th, 2024

Print length: 200 Pages

Weight: 394 grams

Dimensions (height x width x thickness): 17.90 x 23.50 x 1.50 cms

Choose your Location

Shipping & Delivery

Door Delivery

Delivery fee

Delivery in 10 to 14 days

  • Description

  • Reviews

One of the most effective ways an organization can prepare for cybersecurity incidents and test out their response processes are 'tabletop exercises,' commonly used to discuss various actions in a hypothetical emergency. Veteran security consultants Robert Lelewski and John Hollenberger have run hundreds of such exercises, and they've now boiled down their vast experience planning these mission-critical events into the Tabletop Exercises handbook. Designed to take you from start to finish, the book's chapters are arranged linearly - from management's initial request to after-action review activities - empowering you to understand each and every necessary step for ensuring your tabletop is a true success. You'll see how to design a scenario that properly evaluates your team's existing controls, pinpoints your weaknesses, and encourages collaboration. You'll also examine the logistics of planning the event itself, develop effective facilitation skills, and explore ways of making process changes based on the tabletop's outcomes. Along the way, you'll learn: who to invite to your tabletop event, and why; preparatory steps, like getting an executive sponsor and forming a development team; how to properly create a realistic tabletop exercise scenario; facilitation strategies, such as audience interaction and managing the discussion. This essential soup-to-nuts resource also includes example scenarios geared at varying audiences at different levels - including infosec analysts, tech team members, non-technical employees, and executives - that you can easily adapt for your own organization depending on the goals of your tabletop.
One of the most effective ways an organization can prepare for cybersecurity incidents and test out their response processes are ''tabletop exercises,'' commonly used to discuss various actions in a hypothetical emergency. Veteran security consultants Robert Lelewski and John Hollenberger have run hundreds of such exercises, and they''ve now boiled down their vast experience planning these mission-critical events into the Tabletop Exercises handbook. Designed to take you from start to finish, the book''s chapters are arranged linearly - from management''s initial request to after-action review activities - empowering you to understand each and every necessary step for ensuring your tabletop is a true success. You''ll see how to design a scenario that properly evaluates your team''s existing controls, pinpoints your weaknesses, and encourages collaboration. You''ll also examine the logistics of planning the event itself, develop effective facilitation skills, and explore ways of making process changes based on the tabletop''s outcomes. Along the way, you''ll learn: who to invite to your tabletop event, and why; preparatory steps, like getting an executive sponsor and forming a development team; how to properly create a realistic tabletop exercise scenario; facilitation strategies, such as audience interaction and managing the discussion. This essential soup-to-nuts resource also includes example scenarios geared at varying audiences at different levels - including infosec analysts, tech team members, non-technical employees, and executives - that you can easily adapt for your own organization depending on the goals of your tabletop.

Get Cybersecurity Tabletop Exercises by at the best price and quality guranteed only at Werezi Africa largest book ecommerce store. The book was published by No Starch Press,US and it has pages. Enjoy Shopping Best Offers & Deals on books Online from Werezi - Receive at your doorstep - Fast Delivery - Secure mode of Payment

Customer Reviews

Based on 0 reviews

Mind, Body, & Spirit