As members of the security community, we’re already painfully aware of the sharp increase in major data breaches from glancing at the headlines, getting requests from management to explain the latest security issue, or even receiving notices that our own personal data has been compromised. We don’t need to be told that
This book is intended for anyone with responsibilities related to detecting, responding to, and recovering from major cyberattacks and the cyberthreats behind them.