0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Understand the Cyber Attacker Mindset - Build a Strategic Security Program to Counteract Threats: Sarah Armstrong-Smith Understand the Cyber Attacker Mindset - Build a Strategic Security Program to Counteract Threats
Sarah Armstrong-Smith
R3,267 Discovery Miles 32 670 Ships in 10 - 15 working days

To counteract a cyber attacker, you need to learn to think like one. This book explores the psychology of cyber warfare and how organizations can thwart cyber attackers. Understand the Cyber Attacker Mindset examines the various types of cyber attackers out there and explores their motivations, including financial gain, revenge and the desire for power and control. It examines the methods used, such as social engineering and manipulation, and discusses the challenges faced by law enforcement in tracking and apprehending them. It provides a comprehensive look at the inner workings of the cyber attacker mind in the digital age and concludes with a set of strategies that organizations can deploy to counteract them, including tactics on training people to identify and resist manipulation. Written by a renowned cybersecurity leader, the book draws on interviews with top experts in the field in both public and private sectors to share rich insights and a wide range of case studies profiling notable cyber crime incidents. With continual technological advancements in cybersecurity, the cyber crime industry is increasingly falling back to social engineering and preying on people's vulnerabilities. The human side of cybersecurity has never been so important.

Understand the Cyber Attacker Mindset - Build a Strategic Security Program to Counteract Threats: Sarah Armstrong-Smith Understand the Cyber Attacker Mindset - Build a Strategic Security Program to Counteract Threats
Sarah Armstrong-Smith
R912 Discovery Miles 9 120 Ships in 12 - 17 working days

To counteract a cyber attacker, you need to learn to think like one. This book explores the psychology of cyber warfare and how organizations can thwart cyber attackers. Understand the Cyber Attacker Mindset examines the various types of cyber attackers out there and explores their motivations, including financial gain, revenge and the desire for power and control. It examines the methods used, such as social engineering and manipulation, and discusses the challenges faced by law enforcement in tracking and apprehending them. It provides a comprehensive look at the inner workings of the cyber attacker mind in the digital age and concludes with a set of strategies that organizations can deploy to counteract them, including tactics on training people to identify and resist manipulation. Written by a renowned cybersecurity leader, the book draws on interviews with top experts in the field in both public and private sectors to share rich insights and a wide range of case studies profiling notable cyber crime incidents. With continual technological advancements in cybersecurity, the cyber crime industry is increasingly falling back to social engineering and preying on people's vulnerabilities. The human side of cybersecurity has never been so important.

Managing Risks in Digital Transformation - Navigate the modern landscape of digital threats with the help of real-world... Managing Risks in Digital Transformation - Navigate the modern landscape of digital threats with the help of real-world examples and use cases (Paperback)
Ashish Kumar, Shashank Kumar, Abbas Kudrati, Sarah Armstrong-Smith
R885 Discovery Miles 8 850 Ships in 10 - 15 working days

Secure your business in a post-pandemic world: Master digital risk identification and defense Purchase of the print or Kindle book includes a free PDF eBook Key Features Become well-versed with sophisticated system-level security risks and the zero-trust framework Learn about remote working risks, modern collaboration, and securing the digital data estate Keep up with rapidly evolving compliances and regulations and their impact on cyber risks Book DescriptionWith the rapid pace of digital change today, especially since the pandemic sped up digital transformation and technologies, it has become more important than ever to be aware of the unknown risks and the landscape of digital threats. This book highlights various risks and shows how business-as-usual operations carried out by unaware or targeted workers can lead your organization to a regulatory or business risk, which can impact your organization's reputation and balance sheet. This book is your guide to identifying the topmost risks relevant to your business with a clear roadmap of when to start the risk mitigation process and what your next steps should be. With a focus on the new and emerging risks that remote-working companies are experiencing across diverse industries, you'll learn how to manage risks by taking advantage of zero trust network architecture and the steps to be taken when smart devices are compromised. Toward the end, you'll explore various types of AI-powered machines and be ready to make your business future-proof. In a nutshell, this book will direct you on how to identify and mitigate risks that the ever- advancing digital technology has unleashed. What you will learn Become aware of and adopt the right approach to modern digital transformation Explore digital risks across companies of all sizes Study real-world cases that focus on post-pandemic digital transformation Understand insider threats and how to mitigate vulnerability exploitation Get to know how cyberwarfare targets infrastructure and disrupts critical systems Discover how implementing a regulatory framework can safeguard you in the current and future data landscapes Who this book is forThis book is for three categories of readers—those who own a business and are planning to scale it; those who are leading business and technology charters in large companies or institutions; and those who are academically or disciplinarily targeting cybersecurity and risk management as a practice-area. Essentially, this book is for board members, and professionals working in IT, GRC, and legal domains. It will also help technology leaders, including chief digital officers, chief privacy officers, chief risk officers, CISOs, CIOs, as well as students and cybersecurity enthusiasts with basic awareness of risks to navigate the digital threat landscape.

Effective Crisis Management - A Robust A-Z Guide for Demonstrating Resilience by Utilizing Best Practices, Case Studies, and... Effective Crisis Management - A Robust A-Z Guide for Demonstrating Resilience by Utilizing Best Practices, Case Studies, and Experiences (Paperback)
Sarah Armstrong-Smith
R954 Discovery Miles 9 540 Ships in 9 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Stabilo Mini World Pastel Love Gift Set…
R667 Discovery Miles 6 670
Fly Repellent ShooAway (Black)(2 Pack)
R698 R578 Discovery Miles 5 780
Mediabox NEO TV Stick (Black) - Netflix…
R1,189 Discovery Miles 11 890
Pete's Dragon
Bryce Dallas Howard, Oakes Fegley, … Blu-ray disc R199 Discovery Miles 1 990
Goldair USB Fan (Black | 15cm)
R150 Discovery Miles 1 500
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn Paperback R280 R236 Discovery Miles 2 360
Cherevichki: Royal Opera House…
Pyotr Ilyich Tchaikovsky, The Royal Opera, … Blu-ray disc R120 Discovery Miles 1 200
Bostik Glue Stick Value Pack (3 x 40g)
 (1)
R131 Discovery Miles 1 310
Scottish Dances Vol 9
Legget Sandy, Scd Band CD R469 Discovery Miles 4 690
ZA Cute Butterfly Earrings and Necklace…
R712 R499 Discovery Miles 4 990

 

Partners