Your cart is currently empty!
Industrial Cybersecurity – Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment
![](https://ziontechgroup.com/wp-content/uploads/2024/11/71B4OgzzVL._SL1360_.jpg)
Price: $54.99 – $41.37
(as of Nov 27,2024 09:01:24 UTC – Details)
From the Publisher
From the Preface:
By applying a variety of tools, techniques, and technologies, in this book, we will visualize and track security posture and identify threats in the Industrial Control System (ICS) environment. Industrial Cybersecurity, Second Edition looks at implementing a comprehensive and solid security program for the ICS environment and should be read by those who are new to industrial security or are extending their industrial security posture.
With IT industries expanding to the cloud, cyber-attacks have increased significantly. Understanding your control system’s vulnerabilities and learning techniques to defend critical infrastructure systems from cyber threats is becoming increasingly important.
You will begin this book by looking at how to design for security and exploring how to create an architecture that allows all the tools, techniques, and activities discussed in the book to be implemented effectively and easily. You will also learn about activities, tools, procedures, and concepts around the monitoring, tracking, and trending (visualizing) of ICS cybersecurity risks, as well as learning about overall security program and posture/ hygiene. You will also be introduced to threat hunting principles, tools, techniques, and methodology. Toward the end of the book, you will work with incident response and incident recovery tools, techniques, activities, and procedures as they relate to the ICS environment.
By the end of the book, you will be adept at industrial cybersecurity monitoring, assessments, incident response activities, and threat hunting.
Chapter Highlights:
Chapter 2, A Modern Look at Industrial Control System Architectures, gives an overview of ICS security, explaining how I implement plant-wide architectures with some years of experience under my belt. The chapter will cover new concepts, techniques, and best-practice recommendations.
Chapter 3, The Industrial Demilitarized Zone, is where I will discuss an updated IDMZ design – a result of years of refinement, updating, and adjusting the design to business needs, and revising and updating industry best practice recommendations.
Chapter 5, Introduction to Security Monitoring, covers the ins and outs of cybersecurity monitoring as it pertains to the ICS environment. I will present the three main types of cybersecurity monitoring, passive, active, and threat hunting, which are explained in detail throughout the rest of the book.
Chapter 8, Industrial Threat Intelligence, looks at tools, techniques, and activities that help to add threat intelligence to our security monitoring activities.
Chapter 10, Threat Hunting, is a general introduction to threat hunting principles, tools, techniques, and methodology.
Chapter 13, Threat Hunt Use Case 3 – Suspicious External Connections, presents a third threat hunt use case: we suspect that external entities are connecting to our systems. We will use logs, events, data, and other information to prove the hunch and show the what, where, how, and who behind things.
Chapter 15, Industrial Control System Risk Assessments, will detail the tools, techniques, methodologies, and activities used in performing risk assessments for an ICS environment. You will get hands-on experience with the most common tools and software used.
Chapter 16, Red Team versus Blue Team Exercises, will detail the tools, techniques, methodologies, and activities used in performing Red Team and Blue team exercises in an ICS environment. You will get hands-on experience with the most common tools and software used during assessment activities.
Publisher : Packt Publishing; 2nd ed. edition (October 7, 2021)
Language : English
Paperback : 800 pages
ISBN-10 : 1800202091
ISBN-13 : 978-1800202092
Item Weight : 3.01 pounds
Dimensions : 9.25 x 7.52 x 1.59 inches
In today’s increasingly digitalized world, the importance of industrial cybersecurity cannot be overstated. With the rise of Industry 4.0 and the integration of IoT devices into industrial control systems (ICS), the need to protect critical infrastructure from cyber threats has never been more vital.
That’s why we are excited to announce the release of the second edition of our book, “Industrial Cybersecurity: Efficiently monitor the cybersecurity posture of your ICS environment.” This updated edition provides a comprehensive guide to understanding and implementing cybersecurity best practices in industrial settings.
From identifying vulnerabilities in your ICS environment to implementing effective monitoring and incident response strategies, this book covers all aspects of industrial cybersecurity. Whether you are a plant manager, system administrator, or cybersecurity professional, this book will provide you with the knowledge and tools you need to safeguard your organization’s critical assets.
Don’t wait until it’s too late. Take proactive steps to protect your ICS environment and ensure the safety and security of your operations. Order your copy of “Industrial Cybersecurity – Second Edition” today and stay one step ahead of cyber threats.
#Industrial #Cybersecurity #Edition #Efficiently #monitor #cybersecurity #posture #ICS #environment
Leave a Reply