The Practice of NSM References

I’ve resumed reading The Practice of Network Security Monitoring, by Richard Bejtlich.  In the past I’ve stalled once Security Onion is installed as I haven’t had a good place to implement it and continue learning how it works.  So yesterday I skipped ahead to Chapter 9, NSM Operations and read the chapter.  I was surprised to see a bunch of promising references, so I’m going to list them here for future use along with a couple of choice quotes.

First, an opening quote:  “Too many security organizations put tools before operations. <snip> A tool-driven team will not be as effective as a mission-driven team.  When the mission is defined by running software, analysts become captive to the features and limitations of their tools.” [The Practice of Network Security Monitoring, Richard Bejtlich, page 185]

A textbook reference:  Incident Response and Computer Forensics, Third Edition (McGraw Hill Education, 2014 – Jason Luttgens, Matthew Pepe, Kevin Mandia)

Finally, a closing quote:  “…intruders conduct campaigns, and CIRTs defend in waves.” [The Practice of Network Security Monitoring, Richard Bejtlich, page 200]