Sarah Armstrong-Smith
Understand the Cyber Attacker Mindset
Build a Strategic Security Programme to Counteract Threats
Sarah Armstrong-Smith
Understand the Cyber Attacker Mindset
Build a Strategic Security Programme to Counteract Threats
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Delve into the inner workings of the cyber criminal mind and how to defend against their attacks with this strategic deep dive into the human side of cybersecurity.
Andere Kunden interessierten sich auch für
- Laurent RichardPegasus23,99 €
- Becky HolmesKeanu Reeves is Not in Love With You12,99 €
- Laurent RichardPegasus18,99 €
- Laurent RichardPegasus31,99 €
- Geoff WhiteRinsed18,99 €
- Danielle Keats CitronThe Fight for Privacy13,99 €
- Danielle Keats CitronThe Fight for Privacy22,99 €
-
-
-
Delve into the inner workings of the cyber criminal mind and how to defend against their attacks with this strategic deep dive into the human side of cybersecurity.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Kogan Page Ltd
- Seitenzahl: 304
- Erscheinungstermin: 3. März 2024
- Englisch
- Abmessung: 229mm x 155mm x 18mm
- Gewicht: 468g
- ISBN-13: 9781398614284
- ISBN-10: 1398614289
- Artikelnr.: 68285915
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
- Verlag: Kogan Page Ltd
- Seitenzahl: 304
- Erscheinungstermin: 3. März 2024
- Englisch
- Abmessung: 229mm x 155mm x 18mm
- Gewicht: 468g
- ISBN-13: 9781398614284
- ISBN-10: 1398614289
- Artikelnr.: 68285915
- Herstellerkennzeichnung
- Produktsicherheitsverantwortliche/r
- Europaallee 1
- 36244 Bad Hersfeld
- gpsr@libri.de
Sarah Armstrong-Smith has been recognized as one of the most influential leaders in cybersecurity and UK tech and has over 20 years' experience delivering and advising C-suite executives on large-scale business & ICT continuity, cybersecurity, data protection and resilience programmes. She is the Chief Security Advisor at Microsoft and works with strategic and major customers across Europe to help them enhance their security strategies and capabilities. Prior to Microsoft, she was the Group Head of Business Resilience & Crisis Management at The London Stock Exchange Group, the Head of Continuity & Resilience, Enterprise & Cyber Security at Fujitsu and also held roles at EY and AXA. She has been on the front-line of many major incidents, including IT failures, data breaches, and fraud. She is a Fellow of the British Computer Society and is based in Bath, UK.
Section
ONE: Understanding types of attack, how they operate and why they are successful; Chapter
01: The evolution of cybercrime in the digital age; Chapter
02: Understanding the will and motivation of attackers; Chapter
03: Types of cyber attack and why they work; Chapter
04: How covid
19 created an epidemic of cybercrime; Chapter
05: Cybercrime as a service
a booming enterprise; Section
TWO: Incidents, lessons learnt and the rise of the insider threat; Chapter
06: Opportunists and activists
how anyone can become a cybercriminal; Chapter
07: New kids on the block
new groups making names for themselves; Chapter
08: Syndicates
how groups work together to build services and avoid detection; Chapter
09: Brokers
law enforcement headaches in tracking cybercrime and money laundering; Chapter
10: Influencers
how nation
sponsored actors change social dynamics; Chapter
11: Insiders
how attackers take advantage of internal loopholes; Section
THREE: Strategies to counteract the criminal mindset and build resilience; Chapter
12: Why your security awareness training sucks, and education is the differentiator; Chapter
13: Are people really the weakest link? Chapter
14: The human factor
mindset, cultural variances and what factors tip people over the edge; Chapter
15: Strategies for counteracting human adversaries; Chapter
16: The board
level response
how decisions are made in times of crisis; Chapter
17: Final thoughts on the direction and evolution of the human adversary;
ONE: Understanding types of attack, how they operate and why they are successful; Chapter
01: The evolution of cybercrime in the digital age; Chapter
02: Understanding the will and motivation of attackers; Chapter
03: Types of cyber attack and why they work; Chapter
04: How covid
19 created an epidemic of cybercrime; Chapter
05: Cybercrime as a service
a booming enterprise; Section
TWO: Incidents, lessons learnt and the rise of the insider threat; Chapter
06: Opportunists and activists
how anyone can become a cybercriminal; Chapter
07: New kids on the block
new groups making names for themselves; Chapter
08: Syndicates
how groups work together to build services and avoid detection; Chapter
09: Brokers
law enforcement headaches in tracking cybercrime and money laundering; Chapter
10: Influencers
how nation
sponsored actors change social dynamics; Chapter
11: Insiders
how attackers take advantage of internal loopholes; Section
THREE: Strategies to counteract the criminal mindset and build resilience; Chapter
12: Why your security awareness training sucks, and education is the differentiator; Chapter
13: Are people really the weakest link? Chapter
14: The human factor
mindset, cultural variances and what factors tip people over the edge; Chapter
15: Strategies for counteracting human adversaries; Chapter
16: The board
level response
how decisions are made in times of crisis; Chapter
17: Final thoughts on the direction and evolution of the human adversary;
Section
ONE: Understanding types of attack, how they operate and why they are successful; Chapter
01: The evolution of cybercrime in the digital age; Chapter
02: Understanding the will and motivation of attackers; Chapter
03: Types of cyber attack and why they work; Chapter
04: How covid
19 created an epidemic of cybercrime; Chapter
05: Cybercrime as a service
a booming enterprise; Section
TWO: Incidents, lessons learnt and the rise of the insider threat; Chapter
06: Opportunists and activists
how anyone can become a cybercriminal; Chapter
07: New kids on the block
new groups making names for themselves; Chapter
08: Syndicates
how groups work together to build services and avoid detection; Chapter
09: Brokers
law enforcement headaches in tracking cybercrime and money laundering; Chapter
10: Influencers
how nation
sponsored actors change social dynamics; Chapter
11: Insiders
how attackers take advantage of internal loopholes; Section
THREE: Strategies to counteract the criminal mindset and build resilience; Chapter
12: Why your security awareness training sucks, and education is the differentiator; Chapter
13: Are people really the weakest link? Chapter
14: The human factor
mindset, cultural variances and what factors tip people over the edge; Chapter
15: Strategies for counteracting human adversaries; Chapter
16: The board
level response
how decisions are made in times of crisis; Chapter
17: Final thoughts on the direction and evolution of the human adversary;
ONE: Understanding types of attack, how they operate and why they are successful; Chapter
01: The evolution of cybercrime in the digital age; Chapter
02: Understanding the will and motivation of attackers; Chapter
03: Types of cyber attack and why they work; Chapter
04: How covid
19 created an epidemic of cybercrime; Chapter
05: Cybercrime as a service
a booming enterprise; Section
TWO: Incidents, lessons learnt and the rise of the insider threat; Chapter
06: Opportunists and activists
how anyone can become a cybercriminal; Chapter
07: New kids on the block
new groups making names for themselves; Chapter
08: Syndicates
how groups work together to build services and avoid detection; Chapter
09: Brokers
law enforcement headaches in tracking cybercrime and money laundering; Chapter
10: Influencers
how nation
sponsored actors change social dynamics; Chapter
11: Insiders
how attackers take advantage of internal loopholes; Section
THREE: Strategies to counteract the criminal mindset and build resilience; Chapter
12: Why your security awareness training sucks, and education is the differentiator; Chapter
13: Are people really the weakest link? Chapter
14: The human factor
mindset, cultural variances and what factors tip people over the edge; Chapter
15: Strategies for counteracting human adversaries; Chapter
16: The board
level response
how decisions are made in times of crisis; Chapter
17: Final thoughts on the direction and evolution of the human adversary;