Customers who viewed this item also viewed
Buy new:
-17% $41.45$41.45
FREE delivery Friday, November 7
Ships from: Amazon.com Sold by: Amazon.com
Save with Used - Good
$0.01$0.01
$3.99 delivery November 19 - December 4
Ships from: Zoverstocks Sold by: Zoverstocks
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Follow the authors
OK
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan 1st Edition
Purchase options and add-ons
Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone.
Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.
- Learn incident response fundamentals—and the importance of getting back to basics
- Understand threats you face and what you should be protecting
- Collect, mine, organize, and analyze as many relevant data sources as possible
- Build your own playbook of repeatable methods for security monitoring and response
- Learn how to put your plan into action and keep it running smoothly
- Select the right monitoring and detection tools for your environment
- Develop queries to help you sort through data and create valuable reports
- Know what actions to take during the incident response phase
- ISBN-101491949406
- ISBN-13978-1491949405
- Edition1st
- PublisherO'Reilly Media
- Publication dateJune 23, 2015
- LanguageEnglish
- Dimensions7 x 0.63 x 9.19 inches
- Print length273 pages
Frequently bought together

What do customers buy after viewing this item?
Lowest Price
in this set of productsThis item:
Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master PlanPaperbackGet it as soon as Wednesday, Nov 19Most purchased | Highest rated
in this set of products
Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat HunterPaperbackFREE Shipping by AmazonGet it as soon as Friday, Nov 7
The Practice of Network Security Monitoring: Understanding Incident Detection and ResponsePaperback$3.99 shippingGet it Nov 26 - Dec 11Usually ships within 5 to 6 days
Customers also bought or read
- Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.
Paperback$23.74$23.74Delivery Tue, Nov 18 - Incident Response in the Age of Cloud: Techniques and best practices to effectively respond to cybersecurity incidents
Paperback$43.99$43.99FREE delivery Friday - The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Paperback$40.15$40.15$3.99 delivery Thu, Dec 11 - Intelligence-Driven Incident Response: Outwitting the Adversary
Paperback$44.94$44.94FREE delivery Friday - Cybersecurity for Business: Organization-Wide Strategies to Ensure Cyber Risk Is Not Just an IT Issue
Paperback$34.50$34.50Delivery Friday - Defensive Security Handbook: Best Practices for Securing Infrastructure
Paperback$31.09$31.09FREE delivery Friday - Effective Threat Investigation for SOC Analysts: The ultimate guide to examining various threats and attacker techniques using security logs
Paperback$54.99$54.99FREE delivery Friday - This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Paperback$13.21$13.21Delivery Friday - The InfoSec Handbook: An Introduction to Information Security
Paperback$44.99$44.99FREE delivery Friday - ISC2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle (Sybex Study Guide)
Paperback$52.91$52.91FREE delivery Friday - Incident Response for Windows: Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems
Paperback$18.44$18.44Delivery Friday - Cyber for Builders: The Essential Guide to Building a Cybersecurity Startup
Paperback$25.00$25.00Delivery Friday - Zero Trust Networks: Building Secure Systems in Untrusted Networks
Paperback$58.98$58.98$3.99 delivery Wed, Nov 26 - The OSINT Handbook: A practical guide to gathering and analyzing online information
Paperback$28.99$28.99Delivery Friday - Practical Threat Intelligence and Data-Driven Threat Hunting: A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools
Paperback$44.99$44.99FREE delivery Friday - GCIH GIAC Certified Incident Handler All-in-One Exam Guide
Paperback$47.63$47.63FREE delivery Sat, Nov 15 - Blockchain and Ethereum Smart Contract Solution Development: Dapp Programming with Solidity
Paperback$47.38$47.38FREE delivery Friday - A CISO Guide to Cyber Resilience: A how-to guide for every CISO to build a resilient security program
Paperback$38.99$38.99FREE delivery Friday - Cybersecurity First Principles: A Reboot of Strategy and Tactics
Paperback$32.00$32.00Delivery Friday - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Paperback$13.78$13.78Delivery Friday - ChatGPT for Cybersecurity Cookbook: Learn practical generative AI recipes to supercharge your cybersecurity skills
Paperback$36.27$36.27FREE delivery Friday - The Staff Engineer's Path: A Guide for Individual Contributors Navigating Growth and Change
Paperback$26.39$26.39Delivery Friday - PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers
Paperback$32.60$32.60Delivery Friday - Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
Paperback$47.29$47.29FREE delivery Friday - Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
Paperback$28.19$28.19Delivery Friday - Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
Paperback$18.73$18.73Delivery Friday - Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape
Paperback$25.00$25.00Delivery Friday
From the brand
-
Explore security resources
-
More From O'Reilly
-
Sharing the knowledge of experts
O'Reilly's mission is to change the world by sharing the knowledge of innovators. For over 40 years, we've inspired companies and individuals to do new things (and do them better) by providing the skills and understanding that are necessary for success.
Our customers are hungry to build the innovations that propel the world forward. And we help them do just that.
Editorial Reviews
About the Author
Brandon Enright is a senior information security investigator with Cisco Systems. Brandon has a bachelor’s degree in computer science from UC San Diego where he did research in the Systems and Networking group. Brandon has coauthored several papers on the infrastructure and economics of malware botnets and a paper on the impact of low entropy seeds on the generation of SSL certificates. Some of his work in cryptography includes presenting weaknesses in some of the NIST SHA3 competition candidates, fatally knocking one out of the competition, and authoring the Password Hashing Competition proposal OmegaCrypt. Brandon is a long-time contributor to the Nmap project, a fast and featureful port scanner and security tool. In his free time Brandon enjoys mathematical puzzles and logic games.
Matthew Valites is a senior investigator and site lead on Cisco's Computer Security Incident Response Team (CSIRT). He provides expertise building an Incident Response and monitoring program for cloud and hosted service enterprises, with a focus on targeted and high-value assets. A hobbyist Breaker and Maker for as long as he can recall, his current professional responsibilities include security investigations, mining security-centric alerts from large data sets, operationalizing CSIRT's detection logic, and mobile device hacking. Matt enjoys speaking at international conferences, and is keen to share CSIRT's knowledge, best practices, and lessons-learned.
Product details
- Publisher : O'Reilly Media
- Publication date : June 23, 2015
- Edition : 1st
- Language : English
- Print length : 273 pages
- ISBN-10 : 1491949406
- ISBN-13 : 978-1491949405
- Item Weight : 1.02 pounds
- Dimensions : 7 x 0.63 x 9.19 inches
- Best Sellers Rank: #1,193,450 in Books (See Top 100 in Books)
- #193 in Computer Viruses
- #411 in Computer Networking (Books)
- #820 in Computer Network Security
- Customer Reviews:
About the authors

With over twenty years of information security experience, Jeff Bollinger has worked as security architect, incident responder, and people manager for both academic and enterprise networks. Specializing in investigations, network security monitoring, detection engineering, log analysis, and intrusion detection, Jeff Bollinger is the Director of LinkedIn's incident response team (SEEK). Prior to LinkedIn, Jeff helped build and operate one of the world's largest corporate security monitoring infrastructures at Cisco Systems. Jeff regularly speaks at international FIRST conferences, blogs about security topics. He is also the co-author of "Crafting the InfoSec Playbook". Jeff's recent work includes log mining, search optimization, cloud threat research, and security investigations.

Discover more of the author’s books, see similar authors, read book recommendations and more.
Related products with free delivery on eligible orders
Customer reviews
- 5 star4 star3 star2 star1 star5 star78%16%6%0%0%78%
- 5 star4 star3 star2 star1 star4 star78%16%6%0%0%16%
- 5 star4 star3 star2 star1 star3 star78%16%6%0%0%6%
- 5 star4 star3 star2 star1 star2 star78%16%6%0%0%0%
- 5 star4 star3 star2 star1 star1 star78%16%6%0%0%0%
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on August 21, 2019Format: KindleVerified PurchaseI read this book because it was a requirement for my Cyber Security class at Columbia. I will say that I went in already having a Computer Science degree and 10 years of experience in Software Development, so it was easy for me to navigate the technical concepts that the book touches on without difficulty. Another warning I have about Cyber Security in general is that there are a lot of acronyms to know, and I ended up downloading a flashcard app to help myself memorize them all in order to get through this book and the class itself.
If you're thinking about reading it outside of school, I'd recommend it for anyone in a CIO, CISO, or Security Engineer type of role at a company. It's very straightforward and to the point, and it offers specific, detailed, and research backed recommendations for how to establish processes within a company to minimize the risk of a breach. The focus of the book is on how to establish a CIRT (Cyber Incident Response Team), what their responsibilities are and should be, how they should function, how to build a "playbook" for their operations, and ultimately how to best use a dedicated team of analysts and engineers to detect and react to a cyber event within a company. If that's what you're looking for this is a great text. If you want a more general introduction to cyber security then this might not be the only book you want to read.
- Reviewed in the United States on February 25, 2016Format: KindleVerified PurchaseVery good guide on InfoSec program policy development. I think this should be mandatory for anyone moving 'up the chain' in security. In my role as a consultant, I find that there are smart people doing good things...in silos. This guide is a good foundation for building a program that ties disparate efforts together as a cohesive and effective infosec program. This book continues to be a good reference.
I think the book could have been improved with more pictures of alligators and other dangerous reptilian creatures.
- Reviewed in the United States on May 6, 2019Format: PaperbackVerified PurchaseThis book is kind of old for the tech world and it is a surprise that it has not been updated yet.
I gave it 4 stars because: While not cheap, it was not as expensive as other required CyberSec/IT books, the concepts addressed were not hardware specific but rather a learning tool to be used to formulate individualized plans for organizations, and it is written in a well balanced and not so boring manner.
- Reviewed in the United States on May 3, 2016Format: KindleVerified PurchasePhenomenal book, chock full of great ideas about how to build and operationalize your SOC. Includes high level concepts as well as detailed technical ideas. Highly recommended for anyone building or improving a security program.
- Reviewed in the United States on October 8, 2015Format: KindleVerified PurchaseGreat book for infosec pros it gives you an advanced insight about the incident response challenges. The idea of a playbook for IR is great.
- Reviewed in the United States on October 17, 2015Format: PaperbackGreat resource, timely and relevant, should be fundamental reading for network security / cyber security professionals. Great job guys!
- Reviewed in the United States on May 22, 2016Format: PaperbackVerified PurchaseI'm a DFIR investigator with a fair share of experience in this field and I've always been interested in any books on such topics. As far as I can tell Crafting the InfoSec Playbook wants to be a guideline for how to run a SOC.
The first chapters cover very generic facts and best practices around IR and the management of a SOC. During the first 6 chapters I felt like reading Cpt. Obvious notes about running a SOC.
The real "action" starts with chapter 7 and it's quite interesting/useful. You can tell the authors have a solid background in IR but the book will be of little help for mature/advanced security teams.
Top reviews from other countries
Mr. Kevin J. RossReviewed in the United Kingdom on October 24, 20155.0 out of 5 stars This is a wonderful book that is of great value to anyone having ...
Format: PaperbackVerified PurchaseThis is a wonderful book that is of great value to anyone having to do security monitoring. It also wisely determines its direction and sticks to it which is about how to analyse and not about the nuts and bolts technology. Books like Applied Network Security Monitoring can provide a better understanding of that and while the book does not mention specific products or technologies (which it is all the better for) it is wise to make sure however you have the following things in your arsenal to benefit the most from this book's advice:
- Intrusion Detection System
- Network logs covering different aspects of communications (HTTP, SSL, connections etc). Proxies for instance are valuable for HTTP but if you run bro-ids (now just "BRO") it can provide these logs.
- Centalised logging such as with Splunk or elasticsearch/logstash/kibana (ELK) which is free or some other SIEM. Really you need a way to query the data quickly. Into this have your IDS logs, network logs, proxy logs, av logs etc.
Now onto the actual book. It provides a great analysis of:
- Why to monitor
- Methods of ensuring proper monitoring (i.e rather than drilling into the technical basically saying this is what you need to achieve in either technical or process and the path is up to you)
- Thought processes about how to analyse data and ensuring you have enough data to quickly confirm or refute a security incident (extra context really can help you eliminate a false positive quickly so as not to waste time).
- Ideas for queries, data analysis and so on (without drilling into the technical). This is where having log monitoring in place can be of great use so you can begin applying it.
- The book is also more about building and process rather than specific problem/event here is solution. This I feel will allow it to maintain a relevance and not become dated as it teaches you a process in a "teach someone to fish" kind of way and its avoidance of falling into specific technologies, products or problems of the day means it will not become technically irrelevant.
The book is very well written and consistent throughout that successfully provides advice, techniques and processes that apply very well to all levels - from someone just starting out, someone setting up a security monitoring program for the first time through to someone with a established and mature security monitoring environment. The book manages to be relevant, informational and insightful to all these groups without feeling like it is leaning towards a certain level or group which is an impressive technical writing feat. I would highly recommend this book to anyone who has to perform security monitoring tasks given its scope
-
C. GrauReviewed in Germany on June 5, 20165.0 out of 5 stars Handbuch zum Aufbau eines Security Monitoring und Incident Response
Format: PaperbackVerified PurchaseWer auf der Suche nach einen Buch ist in dem einen viele Tools und Technologien für die Durchführung von Incident Response ist, wird mit diesem Buch nicht glücklich werden.
Wer jedoch den Aufbau von einem ganzheitlichen Security Monitoring und Incident Response von der strategischen Seiten her beginnen möchte bekommt mit diesem Buch ein gutes "Playbook" an die Hand.
Mr T WakeReviewed in the United Kingdom on February 23, 20165.0 out of 5 stars Good book.
Format: PaperbackVerified PurchaseExcellent read, very well written and very useful for benchmarking your own security ops teams.
Anon, Bristol, UKReviewed in the United Kingdom on December 30, 20175.0 out of 5 stars Five Stars
Format: PaperbackVerified Purchaseall good









![Texas Property and Casualty Study Cards: Texas Property and Casualty Insurance License Exam Prep 2025-2026 and Practice Test Questions [Full Color Cards]](https://cdn.statically.io/img/m.media-amazon.com/images/I/318M9t1zQpL._AC_SR100,100_QL65_.jpg)

