Blue Team Handbook


Blue Team Handbook
DOWNLOAD
READ ONLINE

Download Blue Team Handbook PDF/ePub or read online books in Mobi eBooks. Click Download or Read Online button to get Blue Team Handbook book now. This website allows unlimited access to, at the time of writing, more than 1.5 million titles, including hundreds of thousands of titles in various foreign languages. If the content not found or just blank you must refresh this page





Blue Team Handbook Incident Response Edition


Blue Team Handbook Incident Response Edition
DOWNLOAD
READ ONLINE

Author : D. W. Murdoch
language : en
Publisher:
Release Date : 2014-08-03

Blue Team Handbook Incident Response Edition written by D. W. Murdoch and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2014-08-03 with Computer crimes categories.


BTHb:INRE - Version 2.2 now available.Voted #3 of the 100 Best Cyber Security Books of All Time by Vinod Khosla, Tim O'Reilly andMarcus Spoons Stevens on BookAuthority.com as of 06/09/2018!The Blue Team Handbook is a "zero fluff" reference guide for cyber security incident responders, security engineers, and InfoSec pros alike. The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience", so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way. Version 2.2 updates: - *** A new chapter on Indicators of Compromise added. - Table format slightly revised throughout book to improve readability. - Dozens of paragraphs updated and expanded for readability and completeness. - 15 pages of new content since version 2.0.



Blue Team Handbook


Blue Team Handbook
DOWNLOAD
READ ONLINE

Author : Don Murdoch
language : en
Publisher: Createspace Independent Publishing Platform
Release Date : 2018-08-26

Blue Team Handbook written by Don Murdoch and has been published by Createspace Independent Publishing Platform this book supported file pdf, txt, epub, kindle and other format this book has been release on 2018-08-26 with categories.


Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases provides the security practitioner with numerous field notes on building a security operations team and mining data sources to get the maximum amount of information out of them with a threat hunting approach. The author shares his fifteen years of experience with SIEMs and security operations after implementing five major platforms, integrating over one hundred data sources into various platforms, and running a MSSP practice.This book covers the topics below using a "zero fluff" approach as if you hired him as a security consultant and were sitting across the table with him (or her). Topics covered include:* The book begins with a discussion for professionals to help them build a successful business case and a project plan, and deciding on SOC tier models. There is also a list of tough questions you need to consider when proposing a SOC, as well as a discussion of layered operating models. * It then goes through numerous data sources that feed a SOC and SIEM and provides specific guidance on how to use those data sources. Most of the examples presented were implemented in one organization or another. These uses cases explain how to use a SIEM and how to use the data coming into the platform, a question that is poorly answered by many vendors.* An inventory of Security Operations Center (SOC) Services.* Several business concepts are also introduced, because they are often overlooked by IT: value chain, PESTL, and SWOT. * Metrics.* SOC staff onboarding, training topics, and desirable skills. Along these lines, there is a chapter on a day in the life of a SOC analyst. * Maturity analysis for the SOC and the log management program. * Applying a Threat Hunt mindset to the SOC. * A full use case template that was used within two major Fortune 500 companies, and is in active use by one major SIEM vendor, along with a complete example of how to build a SOC and SIEM focused use case. You can see the corresponding discussion on YouTube - search for the 2017 Security Onion conference. * Critical topics in deploying SIEM based on experience deploying five different technical platforms for nineteen different organizations in education, nonprofit, and commercial enterprises from 160 to 30,000 personnel. * Understanding why SIEM deployments fail with actionable compensators. * Real life experiences getting data into SIEM platforms and the considerations for the many different ways to provide data. * Issues relating to time, time management, and time zones. * Critical factors in log management, network security monitoring, continuous monitoring, and security architecture related directly to SOC and SIEM.* A table of useful TCP and UDP port numbers.This is the second book in the Blue Team Handbook Series. Volume One, focused on incident response, has over 32,000 copies in print and has a 4.5/5.0 review rating!



Btfm


Btfm
DOWNLOAD
READ ONLINE

Author : Alan White
language : en
Publisher: Createspace Independent Publishing Platform
Release Date : 2017

Btfm written by Alan White and has been published by Createspace Independent Publishing Platform this book supported file pdf, txt, epub, kindle and other format this book has been release on 2017 with Computer crimes categories.


Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.



Defensive Security Handbook


Defensive Security Handbook
DOWNLOAD
READ ONLINE

Author : Lee Brotherston
language : en
Publisher: "O'Reilly Media, Inc."
Release Date : 2017-04-03

Defensive Security Handbook written by Lee Brotherston and has been published by "O'Reilly Media, Inc." this book supported file pdf, txt, epub, kindle and other format this book has been release on 2017-04-03 with Computers categories.


Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost. Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks. Learn fundamentals of starting or redesigning an InfoSec program Create a base set of policies, standards, and procedures Plan and design incident response, disaster recovery, compliance, and physical security Bolster Microsoft and Unix systems, network infrastructure, and password management Use segmentation practices and designs to compartmentalize your network Explore automated process and tools for vulnerability management Securely develop code to reduce exploitable errors Understand basic penetration testing concepts through purple teaming Delve into IDS, IPS, SOC, logging, and monitoring



Blue Team Handbook Soc Siem And Threat Hunting V1 02


Blue Team Handbook Soc Siem And Threat Hunting V1 02
DOWNLOAD
READ ONLINE

Author : Don Murdoch
language : en
Publisher:
Release Date : 2019-03-25

Blue Team Handbook Soc Siem And Threat Hunting V1 02 written by Don Murdoch and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2019-03-25 with categories.


Blue Team Handbook: SOC, SIEM, and Threat Hunting Use Cases is having an amazing impact on Security Operations worldwide. BTHb:SOCTH is the go to guiding book for new staff at a top 10 MSSP, integrated into University curriculum, and cited in top ten courses from a major information security training company. This listing is for V1.02.BTHb:SOCTH provides the security practitioner with numerous field notes on building a security operations team, managing SIEM, and mining data sources to get the maximum amount of information out of them with a threat hunting approach. The author shares his fifteen years of experience with SIEMs and security operations is a no frills, just information format. Don Murdoch has implemented five major platforms, integrated over one hundred data sources into various platforms, and ran an MSSP practice for two years.This book covers the topics below using a "zero fluff" approach as if you hired him as a security consultant and were sitting across the table with him (or her).The book begins with a discussion for professionals to help them build a successful business case and a project plan, decide on SOC tier models, anticipate and answer tough questions you need to consider when proposing a SOC, and considerations in building a logging infrastructure. The book goes through numerous data sources that feed a SOC and SIEM and provides specific real world guidance on how to use those data sources to best possible effect. Most of the examples presented were implemented in one organization or another. These uses cases explain on what to monitor, how to use a SIEM and how to use the data coming into the platform, both questions that Don found is often answered poorly by many vendors. Several business concepts are also introduced, because they are often overlooked by IT: value chain, PESTL, and SWOT. Major sections include:An inventory of Security Operations Center (SOC) Services.Metrics, with a focus on objective measurements for the SOC, for analysts, and for SIEM's.SOC staff onboarding, training topics, and desirable skills. Along these lines, there is a chapter on a day in the life of a SOC analyst.Maturity analysis for the SOC and the log management program. Applying a Threat Hunt mindset to the SOC. A full use case template that was used within two major Fortune 500 companies, and is in active use by one major SIEM vendor, along with a complete example of how to build a SOC and SIEM focused use case. You can see the corresponding discussion of this chapter on YouTube. Just search for the 2017 Security Onion conference for the presentation.Critical topics in deploying SIEM based on experience deploying five different technical platforms for nineteen different organizations in education, nonprofit, and commercial enterprises from 160 to 30,000 personnel.Understanding why SIEM deployments fail with actionable compensators. Real life experiences getting data into SIEM platforms and the considerations for the many different ways to provide data. Issues relating to time, time management, and time zones.



Ptfm


Ptfm
DOWNLOAD
READ ONLINE

Author : Tim Bryant
language : en
Publisher: Pragma LLC
Release Date : 2021-01-16

Ptfm written by Tim Bryant and has been published by Pragma LLC this book supported file pdf, txt, epub, kindle and other format this book has been release on 2021-01-16 with Computers categories.


Red teams can show flaws that exist in your network before they are compromised by malicious actors and blue teams traditionally assess current security measures and identify security flaws. The teams can provide valuable feedback to each other, but this is often overlooked, enter the purple team. The purple team allows for the integration of red team tactics and blue team security measures. The purple team field manual is a manual for all security professionals and integrates red and blue team methodologies.



Operator Handbook


Operator Handbook
DOWNLOAD
READ ONLINE

Author : Joshua Picolet
language : en
Publisher:
Release Date : 2020-03-18

Operator Handbook written by Joshua Picolet and has been published by this book supported file pdf, txt, epub, kindle and other format this book has been release on 2020-03-18 with categories.


The Operator Handbook takes three disciplines (Red Team, OSINT, Blue Team) and combines them into one complete reference guide. The book contains 123 individual cheat sheet references for many of the most frequently used tools and techniques by practitioners. Over 400 pages of content to assist the most seasoned cybersecurity veteran or someone just getting started in the career field. The goal of combining all disciplines into one book was to remove the artificial barriers that only certain knowledge exists within a "Team". The reality is today's complex digital landscape demands some level of knowledge in all areas. The "Operator" culture should mean a well-rounded team member no matter the "Team" you represent. All cybersecurity practitioners are Operators. The Blue Team should observe and understand Red Team tactics, Red Team should continually push collaboration with the Blue Team, and OSINT should continually work to peel back evidence of evil doers scattered across disparate data sources. In the spirit of having no separation, each reference is listed in alphabetical order. Not only does this remove those team separated notions, but it also aids in faster lookup. We've all had the same experience where we knew there was an "NMAP Cheat Sheet" but did it fall under Networking, Windows, or Tools? In the Operator Handbook it begins with "N" so flip to the N's section. Also almost every topic is covered in "How to exploit X" and "How to defend X" perspectives. Tools and topics covered: Cloud (AWS, Azure, GCP), Windows, macOS, Linux, Android, iOS, DevOps (Docker, Kubernetes), OSINT, Ports, Forensics, Malware Resources, Defender tools, Attacker tools, OSINT tools, and various other supporting tools (Vim, iptables, nftables, etc...). This handbook was truly meant to be a single source for the most common tool and techniques an Operator can encounter while on the job. Search Copy Paste L33t.



Crafting The Infosec Playbook


Crafting The Infosec Playbook
DOWNLOAD
READ ONLINE

Author : Jeff Bollinger
language : en
Publisher: "O'Reilly Media, Inc."
Release Date : 2015-05-07

Crafting The Infosec Playbook written by Jeff Bollinger and has been published by "O'Reilly Media, Inc." this book supported file pdf, txt, epub, kindle and other format this book has been release on 2015-05-07 with Computers categories.


Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on security tools alone. Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture. Learn incident response fundamentals—and the importance of getting back to basics Understand threats you face and what you should be protecting Collect, mine, organize, and analyze as many relevant data sources as possible Build your own playbook of repeatable methods for security monitoring and response Learn how to put your plan into action and keep it running smoothly Select the right monitoring and detection tools for your environment Develop queries to help you sort through data and create valuable reports Know what actions to take during the incident response phase



Team Topologies


Team Topologies
DOWNLOAD
READ ONLINE

Author : Matthew Skelton
language : en
Publisher: IT Revolution
Release Date : 2019-09-17

Team Topologies written by Matthew Skelton and has been published by IT Revolution this book supported file pdf, txt, epub, kindle and other format this book has been release on 2019-09-17 with Business & Economics categories.


Effective software teams are essential for any organization to deliver value continuously and sustainably. But how do you build the best team organization for your specific goals, culture, and needs? Team Topologies is a practical, step-by-step, adaptive model for organizational design and team interaction based on four fundamental team types and three team interaction patterns. It is a model that treats teams as the fundamental means of delivery, where team structures and communication pathways are able to evolve with technological and organizational maturity. In Team Topologies, IT consultants Matthew Skelton and Manuel Pais share secrets of successful team patterns and interactions to help readers choose and evolve the right team patterns for their organization, making sure to keep the software healthy and optimize value streams. Team Topologies is a major step forward in organizational design for software, presenting a well-defined way for teams to interact and interrelate that helps make the resulting software architecture clearer and more sustainable, turning inter-team problems into valuable signals for the self-steering organization.



Sprint Republish


Sprint Republish
DOWNLOAD
READ ONLINE

Author : Jake Knapp
language : id
Publisher: Bentang Pustaka
Release Date : 2018-07-19

Sprint Republish written by Jake Knapp and has been published by Bentang Pustaka this book supported file pdf, txt, epub, kindle and other format this book has been release on 2018-07-19 with Business & Economics categories.


Anda mungkin beruntung memiliki pekerjaan atau proyek mendatang dengan visi yang cemerlang. Namun, upaya mewujudkan visi ini sering kali tak mudah. Setiap hari Anda gampang sekali terjebak dalam berbagai hal: surel yang seolah tiada habisnya, tenggat yang molor, rapat-rapat seharian yang menyita waktu, dan proyek jangka panjang yang hanya berdasarkan asumsi. Sudah waktunya Anda mencoba Sprint, sebuah metode untuk memecahkan masalah dan menguji ide-ide baru, menyelesaikan lebih banyak hal dengan efisien. Buku ini ditulis Jake Knapp, mantan Design Partner Google Ventures, untuk menuntun Anda merasakan pengalaman menerapkan metode yang telah mendunia ini. Sprint mewujudkan pengeksekusian ide besar hanya dalam lima hari. Menuntun tim Anda dengan checklist lengkap, mulai dari Senin hingga Jumat. Menjawab segala pertanyaan penting yang sering kali hanya disimpan di benak mereka yang sedang menguji ide/konsep/produk. Sprint juga membantu Anda lebih menikmati setiap proses. Anda bisa mengamati dan bergabung dengan ratusan dari pelaku Sprint di seluruh dunia melalui tagar #sprintweek di Twitter. Sebuah proyek besar terjadi pada 2009. Seorang insinyur Gmail bernama Peter Balsiger mencetuskan ide mengenai surel yang bisa teratur secara otomatis. Saya sangat tertarik dengan idenya—yang disebut “Kotak Masuk Prioritas”—dan merekrut insinyur lain, Annie Chen, untuk bergabung bersama kami. Annie setuju, tetapi dia hanya punya waktu sebulan untuk mengerjakannya. Kalau kami tidak bisa membuktikan bahwa ide itu bisa diterapkan dalam jangka waktu tersebut, Annie akan beralih ke proyek lainnya. Saya yakin waktunya tidak akan cukup, tetapi Annie adalah insinyur yang luar biasa. Jadi, saya memutuskan untuk menjalaninya saja. Kami membagi waktu sebulan itu ke dalam empat bagian yang masing-masing lamanya seminggu. Setiap pekan, kami menggarap desain baru. Annie dan Peter membuat purwarupa, lalu pada akhir minggu, kami menguji desain ini bersama beberapa ratus orang lainnya. Pada akhir bulan, kami menemukan solusi yang bisa dipahami dan diinginkan orang- orang. Annie tetap menjadi pemimpin untuk tim Kotak Masuk Prioritas. Dan entah bagaimana caranya, kami berhasil menyelesaikan tugas desainnya dalam waktu yang lebih singkat dari biasanya. Beberapa bulan kemudian, saya mengunjungi Serge Lachapelle dan Mikael Drugge, dua orang karyawan Google di Stockholm. Kami bertiga ingin menguji ide perangkat lunak untuk konferensi video yang bisa dijalankan lewat peramban. Karena saya berada di kota tersebut hanya selama beberapa hari, kami bekerja secepat mungkin. Pada penghujung kunjungan saya, kami berhasil menyelesaikan purwarupanya. Kami mengirimkannya ke rekan kerja kami lewat surel dan mulai menggunakannya dalam rapat. Dalam beberapa bulan, seluruh perusahaan sudah bisa menggunakannya. (Selanjutnya, versi yang sudah dipoles dan disempurnakan dari aplikasi berbasis web tersebut dikenal sebagai Google Hangouts.) Dalam kedua kasus tersebut, saya menyadari bahwa saya bekerja jauh lebih efektif ketimbang rutinitas kerja harian saya atau ketika mengikuti lokakarya diskusi sumbang saran. Apa yang membedakannya? Saya menimbang kembali lokakarya tim yang saya gagas sebelumnya. Bagaimana kalau saya memasukkan elemen ajaib lainnya—fokus pada kerja individu, waktu untuk membuat purwarupa, dan tenggat yang tak bisa ditawar? Saya lalu menyebutkan, “sprint” desain. Saya membuat jadwal kasar untuk sprint pertama saya: satu hari untuk berbagi informasi dan mereka ide, diikuti dengan empat hari pembuatan purwarupa. Sekali lagi, tim Google menyambut baik eksperimen ini. Saya memimpin sprint untuk mendesain Chrome, Google Search, Gmail, dan proyek-proyek lainnya. Ini sangat menarik. Sprint ini berhasil. Ide-ide diuji, dibangun, diluncurkan, dan yang terbaik, kebanyakan dari ide-ide ini berhasil diterapkan dalam dunia nyata. Proses sprint menyebar di seisi Google dari satu tim ke tim lain, dari satu kantor ke kantor lain. Seorang desainer dari Google X tertarik dengan metode ini, jadi dia menjalankan sprint untuk sebuah tim di Google Ads. Anggota tim dalam sprint di Ads kemudian menyampaikannya kepada kolega mereka, dan begitu seterusnya. Dalam waktu singkat saya mendengar penerapan sprint dari orang-orang yang tidak saya kenal. Dalam perjalanannya, saya membuat beberapa kesalahan. Sprint pertama saya melibatkan empat puluh orang—jumlah yang sangat besar dan justru hampir menghambat sprint tersebut, bahkan sebelum dimulai. Saya menyesuaikan waktu yang diperlukan untuk mengembangkan ide dan pembuatan purwarupa. Saya jadi memahami mana yang terlalu cepat, terlalu lambat, hingga akhirnya menemukan yang waktu paling sesuai. Beberapa tahun kemudian, saya bertemu Bill Maris untuk membicarakan sprint. Bill adalah CEO Google Ventures, perusahaan modal ventura yang didirikan Google untuk berinvestasi pada startup-startup potensial. Dia adalah salah satu orang berpengaruh di Silicon Valley. Namun, Anda tidak akan menyangkanya dari pembawaannya yang santai. Pada sore itu, dia mengenakan pakaian khasnya, yaitu topi bisbol dan kaus dengan tulisan tentang Vermont. Bill tertarik untuk menjalankan sprint dengan startup dalam portofolio GV. Startup biasanya hanya memiliki satu kesempatan emas untuk mendesain sebuah produk yang sukses, sebelum akhirnya kehabisan dana. Sprint bisa membantu mencari tahu apakah startup-startup ini berada di jalur yang tepat sebelum akhirnya mereka bisa berkecimpung dalam tahapan yang lebih berisiko untuk membangun dan meluncurkan produk mereka. Dengan menjalankan sprint, mereka bisa mendapatkan sekaligus menghemat uang. Namun agar berhasil, saya harus menyesuaikan proses sprint ini. Saya sudah berpikir mengenai produktivitas individu dan tim selama beberapa tahun. Namun, saya hampir tidak tahu apa-apa mengenai startup dan kebutuhan bisnis mereka. Tetap saja, antusiasme Bill meyakinkan saya bahwa Google Ventures adalah tempat yang tepat untuk menerapkan sprint—sekaligus tempat yang tepat bagi saya. “Ini misi kita,” ujarnya, “untuk bisa menemukan entrepreneur terbaik di muka bumi dan membantu mereka membuat dunia ini menjadi tempat yang lebih baik.” Saya tentu tak bisa menolaknya. Di GV, saya bergabung dengan tiga rekan lain: Braden Kowitz, John Zeratsky, dan Michael Margolis. Bersama, kami mulai menjalankan sprint dengan startup-startup, bereksperimen dengan prosesnya, dan menguji hasilnya agar bisa menemukan cara untuk memperbaikinya. Ide-ide dalam buku ini lahir dari semua anggota tim kami. Braden Kowitz memasukkan desain berbasis cerita dalam proses sprint, sebuah pendekatan tak biasa yang berfokus pada pengalaman konsumen alih-alih komponen individu atau teknologi. John Zeratsky membantu kami memulai dari akhir sehingga tiap sprint bisa membantu menjawab berbagai pertanyaan bisnis paling penting. Braden dan John memiliki pengalaman dalam bisnis dan startup, hal yang tidak saya miliki, dan mereka menyesuaikan prosesnya untuk menciptakan fokus yang lebih baik dan keputusan yang lebih cerdas di tiap sprint. Michael Margolis mendorong kami untuk mengakhiri tiap sprint dengan pengujian di dunia nyata. Dia menjalankan riset konsumen, yang perencanaan dan pelaksanaannya bisa menghabiskan waktu berminggu-minggu, dan menemukan cara untuk mendapatkan hasil yang jelas hanya dalam sehari. Ini benar-benar sebuah keajaiban. Kami tidak perlu lagi menebak-nebak apakah solusi kami bagus atau tidak karena di akhir tiap sprint, kami mendapatkan jawabannya. Kemudian ada Daniel Burka, seorang entrepreneur yang mendirikan dua startup sebelum menjual salah satunya ke Google dan bergabung dengan GV. Saat kali pertama menjelaskan proses sprint kepadanya, dia skeptis. Baginya, sprint terdengar seperti serangkaian proses manajemen yang rumit. Namun, dia sepakat untuk mencoba salah satunya. “Dalam sprint pertama itu, kami memangkas prosesnya dan menciptakan sesuatu yang ambisius hanya dalam sepekan. Saya benar-benar jatuh hati.” Setelah kami berhasil meyakinkannya, pengalaman langsung Daniel sebagai seorang pendiri startup dan sikapnya yang tidak menoleransi omong kosong membantu kami menyempurnakan prosesnya. Sejak sprint pertama di GV pada 2012, kami telah beradaptasi dan bereksperimen. Mulanya kami mengira pembuatan purwarupa dan riset yang cepat hanya akan berhasil untuk produk berskala besar. Mampukah kami bergerak sama cepatnya jika konsumen kami adalah para ahli di berbagai bidang seperti kesehatan dan keuangan? Tanpa disangka, proses lima hari ini bisa bertahan. Proses ini sesuai untuk semua jenis konsumen, mulai dari investor sampai petani, dari onkolog sampai pemilik bisnis skala kecil. Juga bagi situs web, aplikasi iPhone, laporan medis, hingga perangkat keras berteknologi tinggi. Tidak hanya untuk mengembangkan produk, kami juga menggunakan sprint untuk menentukan prioritas, strategi pemasaran, bahkan menamai perusahaan. Proses ini berulang-ulangmenyatukan tim dan menjadikan ide-ide menjadi nyata. Selama beberapa tahun belakangan, tim kami mendapatkan beragam kesempatan untuk bereksperimen dan memvalidasi ide kami mengenai proses kerja. Kami menjalankan lebih dari seratus sprint bersama dengan startup-startup dalam portofolio GV. Kami bekerja bersama, sekaligus belajar dari para entrepreneur brilian seperti Anne Wojcicki (pendiri 23andMe), Ev Williams (pendiri Twitter, Blogger, dan Medium), serta Chad Hurley dan Steve Chen (pendiri YouTube). Pada awalnya, saya hanya ingin membuat hari-hari kerja saya efisien dan berkualitas. Saya ingin berfokus pada apa yang benar-benar penting dan menjadikan waktu saya berharga—bagi saya, tim, dan konsumen kami. Kini, lebih dari satu dekade kemudian, proses sprint secara konsisten telah membantu saya meraih mimpi tesebut. Dan saya sangat senang berbagi mengenai hal tersebut dengan Anda dalam buku ini. Dengan keberuntungan, Anda bisa memilih pekerjaan Anda karena visi yang tajam. Anda ingin berbagi visi tersebut kepada dunia, baik yang berupa pesan, layanan, maupun pengalaman, dengan perangkat lunak maupun keras, atau bahkan—sebagaimana dicontohkan dalam buku ini—sebuah cerita atau ide. Namun, mewujudkan visi ini tak mudah. Gampang sekali terjebak dalam berbagai hal: surel yang seolah tiada habisnya, tenggat yang molor, rapat-rapat seharian yang menyita waktu Anda, dan proyek jangka panjang yang hanya berdasarkan asumsi. Prosesnya tidak harus selalu seperti ini. Sprint menawarkan jalur untuk memecahkan masalah-masalah besar, menguji ide-ide baru, menyelesaikan lebih banyak hal, dan melakukan semuanya dengan lebih cepat. Sprint juga membantu Anda lebih menikmati prosesnya. Dengan kata lain, Anda benar-benar harus mencobanya sendiri. Ayo kita mulai. —Jake Knapp San Francisco, Februari 2016 [Mizan, Bentang Pustaka, Manajemen, Ide, Kreatif, Inovasi, Motivasi, Dewasa, Indonesia] spesial seri bentang bisnis & startup