Index

A

Adaptive security, 34
asset identification and valuation, 268
behavioral analysis, 273274
cloud computing, 274
cost benefit analysis, 271272
critical security controls. See Critical security controls
crypto, 274
damage minimization and control with, 258261
attachments conversion, 259
external users to create internal email, 261
indication of internal/external email, 259
remove all executable content and/or html encoding, 260261
running email client/attachment in virtual machine, 258259
data, 262265
classification, 263
correlation, 273
discovery, 263264
encryption to key management, 274
isolation, 264
prioritization, 262
protection, 265
reduction, 264
endpoint security, 273
final security roadmap, 272
game plan, 265267
data or information, ...

Get Advanced Persistent Threat now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.