|
Showing 1 - 3 of
3 matches in All Departments
Protect Your Organization from Devastating Ransomware and Cyber
Extortion Attacks Ransomware and other cyber extortion crimes have
reached epidemic proportions. The secrecy surrounding them has left
many organizations unprepared to respond. Your actions in the
minutes, hours, days, and months after an attack may determine
whether you'll ever recover. You must be ready. With this book, you
will be. Ransomware and Cyber Extortion is the ultimate practical
guide to surviving ransomware, exposure extortion,
denial-of-service, and other forms of cyber extortion. Drawing
heavily on their own unpublished case library, cyber security
experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you
through responding faster, minimizing damage, investigating more
effectively, expediting recovery, and preventing it from happening
in the first place. Proven checklists help your security teams act
swiftly and effectively together, throughout the entire
lifecycle--whatever the attack and whatever the source. Understand
different forms of cyber extortion and how they evolved Quickly
recognize indicators of compromise Minimize losses with faster
triage and containment Identify threats, scope attacks, and locate
"patient zero" Initiate and manage a ransom negotiation--and avoid
costly mistakes Decide whether to pay, how to perform due
diligence, and understand risks Know how to pay a ransom demand
while avoiding common pitfalls Reduce risks of data loss and
reinfection Build a stronger, holistic cybersecurity program that
reduces your risk of getting hacked This guide offers immediate
value to everyone involved in prevention, response, planning, or
policy: CIOs, CISOs, incident responders, investigators,
negotiators, executives, legislators, regulators, law enforcement
professionals, and others. Register your book for convenient access
to downloads, updates, and/or corrections as they become available.
See inside book for details.
""This is a must-have work for anybody in information security,
digital forensics, or involved with incident handling. As we move
away from traditional disk-based analysis into the
interconnectivity of the cloud, Sherri and Jonathan have created a
framework and roadmap that will act as a seminal work in this
developing field.""- Dr. Craig S. Wright (GSE), Asia Pacific
Director at Global Institute for Cyber Security + Research. ""It's
like a symphony meeting an encyclopedia meeting a spy
novel.""-Michael Ford, Corero Network Security On the Internet,
every action leaves a mark-in routers, firewalls, web proxies, and
within network traffic itself. When a hacker breaks into a bank, or
an insider smuggles secrets to a competitor, evidence of the crime
is always left behind. Learn to recognize hackers' tracks and
uncover network-based evidence in "Network Forensics: Tracking
Hackers through Cyberspace."Carve suspicious email attachments from
packet captures. Use flow records to track an intruder as he pivots
through the network. Analyze a real-world wireless
encryption-cracking attack (and then crack the key yourself).
Reconstruct a suspect's web surfing history-and cached web pages,
too-from a web proxy. Uncover DNS-tunneled traffic. Dissect the
Operation Aurora exploit, caught on the wire. Throughout the text,
step-by-step case studies guide you through the analysis of
network-based evidence. You can download the evidence files from
the authors' web site (lmgsecurity.com), and follow along to gain
hands-on experience. Hackers leave footprints all across the
Internet. Can you find their tracks and solve the case? Pick up
"Network Forensics"and find out.
"Data breaches are inevitable. It is said that there are two types
of companies: those that have had a data breach and those that
don’t yet know they have had one. In preparing for that
inevitability, Data Breaches: Crisis and Opportunity is an
invaluable guide to the history of some of the most significant
data breaches, to what you can do to ensure your firm does not
become another statistic and, in the event it does happen, to
minimize the damage of that breach." -- Ben Rothke, RSA Book of the
Month Selection Protect Your Organization Against Massive Data
Breaches and Their Consequences Data breaches can be catastrophic,
but they remain mysterious because victims don’t want to talk
about them. In Data Breaches, world-renowned cybersecurity expert
Sherri Davidoff shines a light on these events, offering practical
guidance for reducing risk and mitigating consequences. Reflecting
extensive personal experience and lessons from the world’s most
damaging breaches, Davidoff identifies proven tactics for reducing
damage caused by breaches and avoiding common mistakes that cause
them to spiral out of control. You’ll learn how to manage data
breaches as the true crises they are; minimize reputational damage
and legal exposure; address unique challenges associated with
health and payment card data; respond to hacktivism, ransomware,
and cyber extortion; and prepare for the emerging battlefront of
cloud-based breaches. Understand what you need to know about data
breaches, the dark web, and markets for stolen data Limit damage by
going beyond conventional incident response Navigate high-risk
payment card breaches in the context of PCI DSS Assess and mitigate
data breach risks associated with vendors and third-party suppliers
Manage compliance requirements associated with healthcare and HIPAA
Quickly respond to ransomware and data exposure cases Make better
decisions about cyber insurance and maximize the value of your
policy Reduce cloud risks and properly prepare for cloud-based data
breaches  Data Breaches is indispensable for everyone
involved in breach avoidance or response: executives, managers, IT
staff, consultants, investigators, students, and more. Read it
before a breach happens! Register your book for convenient access
to downloads, updates, and/or corrections as they become available.
See inside book for details.
|
|