Part 3:Assume Breach
This part covers what we can do in case of an attack, including the most important part, which is monitoring the threat landscape. It covers the different tools and services that can be used to monitor your attack surface and collect information about new threats.
Lastly, we will go into more depth on the best practices related to protecting Windows from ransomware attacks.
This part has the following chapters:
- Chapter 8, Ransomware Forensics
- Chapter 9, Monitoring the Threat Landscape
- Chapter 10, Best Practices for Protecting Windows from Ransomware Attacks