What does it take to author a cybersecurity book?

Subscribers:
23,700
Published on ● Video Link: https://www.youtube.com/watch?v=nHeK6A_xFlU



Category:
Show
Duration: 1:20:50
255 views
5


Have you ever wondered what it takes to write and publish an information security book? In this special bonus episode following season 4, John discusses with Kathryn, Ingrid, and Carson the challenges and rewards of self-publishing, and the kind of effort that goes into producing a book like "11 Strategies of a World-Class Cybersecurity Operations Center".

This special season of the Blueprint Podcast is taking a deep dive into MITRE’s 11 Strategies of a World-Class Cyber Security Operations Center. Each episode, John will break down a chapter of the book with the book’s authors Kathryn Knerler, Ingrid Parker, and Carson Zimmerman.

If you missed the previous episode on Strategy 11: Turn up the Volume by Expanding SOC Functionality: https://youtu.be/VkR0CSRiueM

For more episodes, visit https://www.sans.org/u/1qz3

To learn more about the 11 Strategies of a World-Class Security Operations Center, visit here: https://www.mitre.org/news-insights/publication/11-strategies-world-class-cybersecurity-operations-center




Other Videos By SANS Cyber Defense


2023-11-05The Importance of Reproducable Methodologies in OSINT Investigations
2023-11-05Lessons Learned From Using OSINT to Track Cybercrime in LATAM
2023-11-05OSINT Uncovered: Enhancing Investigations with the ObSINT Guidelines
2023-11-05The Puzzle Palace Model in OSINT Analytic Mindset
2023-11-05Uncovering Law Enforcement Activities: Darknet Vendor OSINT Perspectives
2023-11-05Tips & Tricks For Digital Dumpster Diving
2023-11-05Unlocking the Digital Landscape: Exploring the Power of OSINT for a Connected World
2023-11-05The Growth of Global Election Disinformation: The Role & Methodology of Govt-linked Cyber Actors
2023-09-12Detection Engineering: The Blue Team Cheat Code | Host: Mark Orlando | September 12, 2023
2023-08-09Hunting for Suspicious HTTPS and TLS Connections
2023-08-03What does it take to author a cybersecurity book?
2023-07-31Join us for the SANS Open-Source Intelligence (OSINT) Summit 2023 - September 22!
2023-07-28The Risk to Space: Satellite Communications Systems and Ground Networks as Attack Targets
2023-07-28Drop It Like It's Qbot Separating malicious droppers, loaders, and crypters from their payloads
2023-07-28Panel | 1%: Tiny Gains producing Big Improvements
2023-07-28Zero Trust Architecture: Beyond Proxy or Point Solutions
2023-07-28Ecosystem of Insights: Building Operation Dashboards That Enable Teams
2023-07-28Bridging the Gap: Improving Rules Effectiveness by Integrating Detection and Response
2023-07-28Blueprint Live - 11 Strategies of a World-Class Cybersecurity Operations Center
2023-07-28Cloudy with a Chance of Breaches: OSINTAdventures in Tracing Exposed Credentials
2023-07-28Hunting OneNote Malware: A Practical Guide for Blue Teams



Tags:
11 strategies of a world-class cybersecurity operations center
11 strategies of a world-class soc
kathryn knerler
carson zimmerman
ingrid parker
john hubbard
blueprint podcast
soc podcast
security operations podcast
cybersecurity book
cyber security book
how to publish a book
how to publish a cybersecurity book
how to self publish a book
how to self publish a cybersecurity book
self publishing advice
self publishing tips
self publishing tips and tricks