Proactive Success
Published: 2019-03-15
Total Pages: 227
Get eBook
This book is the culmination of literally more than thirty thousand hands on practical hours of log review, log assessment, enterprise-level packet capture forensics, live dynamic malware analysis, behavior malware root-cause triage analysis, use-case data analysis, and more, which have led to the remediation of nation state systemic malware infection droppers, command-and-control-compromised computers, exfiltration from targeted attackers and insider attacks, and more. This book will get you and your security operation center teams started in the correct direction instead of sitting around, pretending to do security, and not get fired by your bosses when they find out. This book will save your career and show you where your security manager or security peer lied to you about technology that they never understood. All this and more is at your fingertips. You can reinvigorate your career with security results that have been proven by my hands. Everyone in security operation center life is struggling to get into a role that is promising, and they are struggling to find a way up. Information Security is an expertise-driven field. This book and the others that will follow such as Consequence, Lies, Misconceptions, and Pains of Incompetent Security and Splunk Data Analysis Handbook and Cookbook for Everyone will invigorate your career and make you the envy of your peers. This may include your management, so be careful. Managers are scared of expertise. You will be in the driver's seat of data analysis, but first, you must walk through untying and unbinding all the broken premises and broken ideas that you have learned and relearned from year to year. You must unsubscribe to the bad notions that you take as commonplace watercooler talk. You need to do this now with this book. I will walk you through, step-by-step, to understand what is real security and what is fake security. This is where the rubber meets the road in breaking you free from the shackles of a silo-mentality or a silo-position. Too often crummy managers will leave you to rot in a security operations center with no growth and no hope to get out. This book is what you need to get your promotion somewhere else. Be the leader that you want to be. Be the discussion changer and not just the guy that nods and can never disagree or offer something fulfilling to a team. All the ideas contained in this book and the others come from results-proven security. This is not theory. This is technical, strategy guidance that is born from detecting the things that have put companies on the news, which have been hacked from exfiltration, insider attacks, nation-state botnet malware, ghost malware, network-level postcompromise, and so on. I have found them all using no alerts and no threat intelligence ever. This is the protection that you want.