Practical Cybersecurity Architecture

4.5 (2 reviews total)
By Ed Moyle , Diana Kelley
  • Instant online access to over 7,500+ books and videos
  • Constantly updated with 100+ new titles each month
  • Breadth and depth in over 1,000+ technologies
  1. Section 1:Security Architecture

About this book

Cybersecurity architects work with others to develop a comprehensive understanding of the business' requirements. They work with stakeholders to plan designs that are implementable, goal-based, and in keeping with the governance strategy of the organization.

With this book, you'll explore the fundamentals of cybersecurity architecture: addressing and mitigating risks, designing secure solutions, and communicating with others about security designs. The book outlines strategies that will help you work with execution teams to make your vision a concrete reality, along with covering ways to keep designs relevant over time through ongoing monitoring, maintenance, and continuous improvement. As you progress, you'll also learn about recognized frameworks for building robust designs as well as strategies that you can adopt to create your own designs.

By the end of this book, you will have the skills you need to be able to architect solutions with robust security components for your organization, whether they are infrastructure solutions, application solutions, or others.

Publication date:
November 2020
Publisher
Packt
Pages
418
ISBN
9781838989927

 

Section 1:Security Architecture

This section gives you an overview of what cybersecurity architecture means: what it is, what it includes (and what it doesn't include), why it's useful, and what the role of a cybersecurity architect may encompass, depending on their focus and the organization they work in. The chapters in this section work through the origins of security architecture, common frameworks to architecture, and the evolution of the discipline. 

By understanding why cybersecrity provides value, the architect can then ensure that they are adding the most value to their organization. The first chapter in this section outlines the business value that the cybersecurity architecture process brings about, while the second helps them understand the business and, by extension, the differing needs of different organizations. Since the needs and context of organizations differ, the architect should begin with an understanding of the business and adapt their role in it to ensure that the work they do will be viewed necessary, welcome, and valuable to the organization based on what the organization does, how it does it, and its particular set of needs.

This section comprises the following chapters:

About the Authors

  • Ed Moyle

    Ed Moyle is currently a Partner with SecurityCurve. In his 20 years in information security, Ed has held numerous positions including: Director of Thought Leadership and Research for ISACA, Senior Security Strategist with Savvis, Senior Manager with CTG, and Vice President and Information Security Officer for Merrill Lynch Investment Managers. Ed is co-author of Cryptographic Libraries for Developers and a frequent contributor to the Information Security industry as author, public speaker, and analyst.

    Browse publications by this author
  • Diana Kelley

    Diana is the Cybersecurity Field CTO for Microsoft and a cybersecurity architect, executive advisor, and author. At Microsoft she leads the Cybersecurity Thought Leadership team and leverages her 30 years of cyber-risk and security experience to provide advice and guidance to CSOs, CIOs and CISOs at some of the worlds largest companies and is a contributor to the Microsoft Security Intelligence Report (SIR). In addition to her

    Browse publications by this author

Latest Reviews

(2 reviews total)
Muy completo y actualizado
livre bien et tres lisible
Book Title
Access this book, plus 7,500 other titles for FREE
Access now