Categories

Category cover

Automation
35 posts

Category cover

Notes
19 posts

Category cover

Security
19 posts

Category cover

Personal Security
14 posts

Category cover

Infrastructure
11 posts

Category cover

CISO
10 posts

Category cover

OT/ICS
5 posts

Category cover

Books
3 posts

Category cover

UNetLab
3 posts

Category cover

Write-up
3 posts

Category cover

OSInt
2 posts

Category cover

My life
1 posts

On the other side of the Firewall

Andrea Dainese
June 11, 2024
Post cover

This book originates from the authors’ experience in conducting security incident simulations within companies. The scenarios described are always based on real cases, modified to make them unrecognizable while still usable as tabletop exercises.

The goal is to analyze the organization’s response to specific incidents, highlighting technical, organizational, and procedural difficulties and shortcomings.

The exercises are structured as dialogues between a CISO and their Mentor, dialogues that have actually taken place. The starting point involves a (fictional) company where the CISO works, envisioned as an international manufacturing company with a developed IT infrastructure primarily tied to SAP technologies and internal applications. The IT team is internal and relies on an outsourced SOC service.

On the other side of the Firewall

The workbook is divided into the following chapters:

  • Preface
  • Introduction
  • Scenario 1 - Vulnerability Management
  • Scenario 2 - Unauthorized Software Use
  • Scenario 3 - Foreign File
  • Scenario 4 - Access to Confidential Information
  • Scenario 5 - Double Extortion Attack
  • Conclusions

References