
Cybersecurity Incident & Vulnerability Response Playbooks
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
$0.99/mo for the first 3 months

Buy for $6.95
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Tom Brooks
About this listen
The Cybersecurity and Infrastructure Security Agency (CISA) is committed to leading the response to cybersecurity incidents and vulnerabilities to safeguard the nation's critical assets. Section 6 of Executive Order 14028 directed DHS, via CISA, to “develop a standard set of operational procedures (playbook) to be used in planning and conducting cybersecurity vulnerability and incident response activity respecting Federal Civilian Executive Branch (FCEB) Information Systems.
Overview: This document presents two playbooks, one for incident response and one for vulnerability response. These playbooks provide FCEB agencies with a standard set of procedures to identify, coordinate, remediate, recover, and track successful mitigations from incidents and vulnerabilities affecting FCEB systems, data, and networks. In addition, future iterations of these playbooks may be useful for organizations outside of the FCEB to standardize incident response practices.
Working together across all federal government organizations has proven to be an effective model for addressing vulnerabilities and incidents.
Building on lessons learned from previous incidents and incorporating industry best practices, CISA intends for these playbooks to evolve the federal government’s practices for cybersecurity response through standardizing shared practices that bring together the best people and processes to drive coordinated actions
- The standardized processes and procedures . described in these playbooks:
- Facilitate better coordination and effective response among affected organizations,
- Enable tracking of cross-organizational successful actions,
- Allow for cataloging of incidents to better manage future events, and
- Guide analysis and discovery.
Agencies should use these playbooks to help shape overall defensive cyber operations to ensure consistent and effective response and coordinated communication of response activities.
Scope: These playbooks are for FCEB entities to focus on criteria for response and thresholds for coordination and reporting. They include communications between FCEB entities and CISA; the connective coordination between incident and vulnerability response activities; and common definitions for key cybersecurity terms and aspects of the response process.
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
©2021 Tom Brooks (P)2021 Tom BrooksListeners also enjoyed...
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- By: Recorded Future
- Narrated by: Chris Pace
- Length: 2 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
-
Basic information for starters
- By SUNIL VARKEY on 03-11-19
By: Recorded Future
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 3 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Read by AI
- By Luke on 06-22-24
By: Jamie Murphy
-
Microsoft Certified Azure Administrator
- The Ultimate Guide to Practice Test Questions, Answers, and Master the Associate Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you're an Azure enthusiast aiming to validate your skills or an IT professional seeking to enhance your career prospects, this book will empower you to become a certified Azure Administrator Associate. With a solid grasp of Azure's key principles and hands-on expertise, you'll be well-prepared to meet the growing demand for Azure administrators in today's competitive job market. Start your journey to certification success today.
-
-
Depth in coverage
- By Anonymous User on 11-26-23
By: Jamie Murphy
-
Cryptology for Beginners
- #1 Guide for Security, Encryption, Crypto, Algorithms and Python
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 3 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical. This book invites you on an illuminating journey into the captivating realm of secure communication, demystifying the intricate techniques that have protected secrets and guarded information for centuries.
-
-
Strongly recommend
- By Anonymous User on 09-05-23
By: Jake T Mills
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- By: Recorded Future
- Narrated by: Chris Pace
- Length: 2 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
-
Basic information for starters
- By SUNIL VARKEY on 03-11-19
By: Recorded Future
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 3 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Read by AI
- By Luke on 06-22-24
By: Jamie Murphy
-
Microsoft Certified Azure Administrator
- The Ultimate Guide to Practice Test Questions, Answers, and Master the Associate Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you're an Azure enthusiast aiming to validate your skills or an IT professional seeking to enhance your career prospects, this book will empower you to become a certified Azure Administrator Associate. With a solid grasp of Azure's key principles and hands-on expertise, you'll be well-prepared to meet the growing demand for Azure administrators in today's competitive job market. Start your journey to certification success today.
-
-
Depth in coverage
- By Anonymous User on 11-26-23
By: Jamie Murphy
-
Cryptology for Beginners
- #1 Guide for Security, Encryption, Crypto, Algorithms and Python
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 3 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical. This book invites you on an illuminating journey into the captivating realm of secure communication, demystifying the intricate techniques that have protected secrets and guarded information for centuries.
-
-
Strongly recommend
- By Anonymous User on 09-05-23
By: Jake T Mills
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
The Ultimate Kali Linux Book
- Perform Advanced Penetration Testing Using Nmap, Metasploit, Aircrack-Ng, and Empire, 2nd Edition
- By: Glen D. Singh
- Narrated by: Alex Freeman
- Length: 13 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
Kali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.
-
-
Lack of clarity
- By Anonymous on 01-30-25
By: Glen D. Singh
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
The Art of Invisibility
- The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- By: Kevin Mitnick, Robert Vamosi, Mikko Hypponen
- Narrated by: Ray Porter
- Length: 9 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Like it or not, your every move is being watched and analyzed. Consumers' identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand. In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge - and he teaches you "the art of invisibility".
-
-
Limited value for the average person
- By James C on 10-14-17
By: Kevin Mitnick, and others
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- By Gilan on 01-31-25
By: Matthew K. Sharp, and others
-
Cybersecurity Essentials
- By: Charles J. Brooks, Christopher Grow, Philip Craig, and others
- Narrated by: Ryan Burke
- Length: 17 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Essentials provides a comprehensive introduction to the field, with expert coverage of essential topics required for entry-level cybersecurity certifications. An effective defense consists of four distinct challenges: securing the infrastructure, securing devices, securing local networks, and securing the perimeter. Overcoming these challenges requires a detailed understanding of the concepts and practices within each realm.
-
-
Not made for audio...
- By Kassandra Clauser on 06-07-19
By: Charles J. Brooks, and others
-
Computer Networking and Cybersecurity
- A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cybersecurity Threats
- By: Quinn Kiser
- Narrated by: Ivan Busenius
- Length: 7 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Part one of this audiobook delivers a variety of computer networking-related topics to be easily understood by beginners. In part two, you will take a journey into the world of cybercrimes and cybersecurity. The topics outlined in this audiobook are delivered in a language easy to understand and constantly piquing your interest so that you will want to explore the topics presented even more.
-
-
Antiquated technology
- By Scott Redfern on 10-01-21
By: Quinn Kiser
-
RMF ISSO: Foundations (Guide)
- NIST 800 Risk Management Framework for Cybersecurity Professionals
- By: Bruce Brown
- Narrated by: Frank Block
- Length: 1 hr and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
This is a breakdown of the NIST risk management framework process for cybersecurity professionals getting into security compliance. It is written in layman's terms, without the convoluted way it is described in the NIST SP 800-37 revision 2. It goes into what the information system security officer does at each step in the process and where their attention should be focused. Although the main focus is on implementation of the NIST 800 RMF process, this book covers many of the main concepts on certifications, such as the ISC2 CAP.
-
-
Great supplement to the physical book
- By Andrea Christine on 06-08-24
By: Bruce Brown
-
Cybersecurity Career Master Plan
- Proven Techniques and Effective Tips to Help You Advance in Your Cybersecurity Career
- By: Dr. Gerald Auger, Jaclyn “Jax” Scott, Jonathan Helmus, and others
- Narrated by: The Voice Gallery
- Length: 8 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity is an emerging career trend and will continue to become increasingly important. Despite the lucrative pay and significant career growth opportunities, many people are unsure of how to get started.
-
-
A Must for Aspiring Cybersecurity Professionals
- By Chuck S on 02-12-23
By: Dr. Gerald Auger, and others
-
Navigating the Cybersecurity Career Path
- Insider Advice for Navigating from Your First Gig to the C-Suite
- By: Helen Patton
- Narrated by: Leslie Howard
- Length: 7 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
Finding the right position in cybersecurity is challenging. Being successful in the profession takes a lot of work. And becoming a cybersecurity leader responsible for a security team is even more difficult. In Navigating the Cybersecurity Career Path, decorated chief information security officer Helen Patton delivers a practical and insightful discussion designed to assist aspiring cybersecurity professionals entering the industry and help those already in the industry advance their careers and lead their first security teams.
-
-
This is cyber security not minority politics.
- By Mama on 02-06-25
By: Helen Patton
-
Computer Networking First Step
- The Essential Guide to Networking to Introduce Yourself to The Computer Network Through a Top-Down Approach and Various Infrastructures (Programming)
- By: Tim Wired
- Narrated by: Jacob McNatt
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
While you may have never thought of networking in detail, this book will introduce you to the basics of networking, the different types of networks available, the types of network topologies that you will encounter, the concept of server virtualization, and details of how to handle network breaches.
-
-
If you don't have a text copy of the book, beware
- By A Consumer on 04-08-20
By: Tim Wired
What listeners say about Cybersecurity Incident & Vulnerability Response Playbooks
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Chria
- 09-15-22
Basic and to the point high level
Very basic and short. Good overview for beginners but those experiences will be an overview.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!