Part 2 of this book deals with the flip side of part 1: how we can build out relevant, proportional, and sustainable defenses against the attacks and attackers we met in part 1.
Each chapter looks at important elements that contribute to a successful cybersecurity operations capability. Chapter 8 dives into a commonly misunderstood but important area of cybersecurity: risk management. Chapter 9 then shows how to test your own systems and discover vulnerabilities and covers penetration testing, bug bounty programs, and dedicated hacking teams. Chapter 10 builds on chapters 8 and 9 by describing how security operations work and covers the key areas of monitoring, alerting, and incident response.