Description

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks

Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover.

You must be ready. With this book, you will be.

Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source.

  • Understand different forms of cyber extortion and how they evolved
  • Quickly recognize indicators of compromise
  • Minimize losses with faster triage and containment
  • Identify threats, scope attacks, and locate "patient zero"
  • Initiate and manage a ransom negotiation--and avoid costly mistakes
  • Decide whether to pay, how to perform due diligence, and understand risks
  • Know how to pay a ransom demand while avoiding common pitfalls
  • Reduce risks of data loss and reinfection
  • Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked

This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others.

Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Ransomware and Cyber Extortion: Response and Prevention

Product form

£34.19

Includes FREE delivery
RRP: £37.99 You save £3.80 (10%)
Usually despatched within 4 days
Paperback / softback by Sherri Davidoff , Matt Durrin

1 in stock

Short Description:

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions.... Read more

    Publisher: Pearson Education (US)
    Publication Date: 09/11/2022
    ISBN13: 9780137450336, 978-0137450336
    ISBN10: 0137450338

    Number of Pages: 352

    Non Fiction , Computing

    Description

    Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks

    Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover.

    You must be ready. With this book, you will be.

    Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source.

    • Understand different forms of cyber extortion and how they evolved
    • Quickly recognize indicators of compromise
    • Minimize losses with faster triage and containment
    • Identify threats, scope attacks, and locate "patient zero"
    • Initiate and manage a ransom negotiation--and avoid costly mistakes
    • Decide whether to pay, how to perform due diligence, and understand risks
    • Know how to pay a ransom demand while avoiding common pitfalls
    • Reduce risks of data loss and reinfection
    • Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked

    This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others.

    Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

    Customer Reviews

    Be the first to write a review
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)
    0%
    (0)

    Recently viewed products

    © 2025 Book Curl,

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account