<img height="1" width="1" src="https://www.facebook.com/tr?id=205228923362421&amp;ev=PageView &amp;noscript=1">
Email_CyberFirstPrinciples

Supporting Documents for Cybersecurity First Principles

As a companion to the book, here are some historical reference documents that might be useful for you:

Haven't read the book yet? You can order it from Amazon here.

Road Map for Cybersecurity First Principles

This book covers a lot of material. The diagram below is the road map that you can use to accompany the book. Read it from the bottom up.

The first box is the foundation and absolute cybersecurity first principle (Chapter 2).

The next two rows are the follow-on first-principle strategies that you might use to pursue the ultimate first principle: zero trust (Chapter 4), intrusion kill chain prevention (Chapter 5), resilience (Chapter 6), risk forecasting (Chapter 7), and automation (Chapter 8). 

The remaining boxes are the tactics you might use to pursue each strategy. They show up as sections within the chapters. The grey lines show the connections between the strategies and the tactics. note that the automation strategy and compliance tactic cut across everything. Chapter 8 tells you why.

Want a quick-hitting overview of the content covered? See our Cybersecurity First Principles course here.

First Principles Road Map