Computers & Internet Books:

Ransomware and Cyber Extortion

Response and Prevention
Click to share your rating 0 ratings (0.0/5.0 average) Thanks for your vote!

Format:

Paperback / softback
$122.00
Available from supplier

The item is brand new and in-stock with one of our preferred suppliers. The item will ship from a Mighty Ape warehouse within the timeframe shown.

Usually ships in 2-3 weeks
Free Delivery with Primate
Join Now

Free 14 day free trial, cancel anytime.

Buy Now, Pay Later with:

4 payments of $30.50 with Afterpay Learn more

6 weekly interest-free payments of $20.33 with Laybuy Learn more

Availability

Delivering to:

Estimated arrival:

  • Around 18-28 June using International Courier

Description

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you’ll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source. Understand different forms of cyber extortion and how they evolved Quickly recognize indicators of compromise Minimize losses with faster triage and containment Identify threats, scope attacks, and locate "patient zero" Initiate and manage a ransom negotiation--and avoid costly mistakes Decide whether to pay, how to perform due diligence, and understand risks Know how to pay a ransom demand while avoiding common pitfalls Reduce risks of data loss and reinfection Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Author Biography:

Sherri Davidoff, CEO of LMG Security and author of Data Breaches, has been called a "security badass" by the New York Times. An instructor at the renowned Black Hat cybersecurity trainings, she is a GIAC-certified forensic analyst (GCFA) and penetration tester (GPEN). She holds a degree in computer science and electrical engineering from MIT. Matt Durrin, the Director of Training and Research at LMG Security, is a popular speaker at national conferences and training venues. His malware research has been featured on the NBC Nightly News. Karen Sprenger, LMG Security's COO and chief ransomware negotiator, is a noted industry expert, speaker, trainer, and course developer with 25+ years of security/IT experience. She is a GIAC-certified forensic examiner (GCFE) and Certified Information Systems Security Professional (CISSP).
Release date NZ
November 9th, 2022
Audience
  • Professional & Vocational
Pages
352
Dimensions
180x230x15
ISBN-13
9780137450336
Product ID
35179168

Customer reviews

Nobody has reviewed this product yet. You could be the first!

Write a Review

Marketplace listings

There are no Marketplace listings available for this product currently.
Already own it? Create a free listing and pay just 9% commission when it sells!

Sell Yours Here

Help & options

Filed under...