Ransomware and Cyber Extortion: Response and Prevention | Agenda Bookshop Skip to content
Online orders placed from 19/12 onward will not arrive in time for Christmas.
Online orders placed from 19/12 onward will not arrive in time for Christmas.
A01=Karen Sprenger
A01=Matt Durrin
A01=Sherri Davidoff
Age Group_Uncategorized
Age Group_Uncategorized
Author_Karen Sprenger
Author_Matt Durrin
Author_Sherri Davidoff
automatic-update
Category1=Non-Fiction
Category=UTN
Category=UTS
COP=United States
Delivery_Delivery within 10-20 working days
Language_English
PA=In stock
Price_€20 to €50
PS=Active
softlaunch

Ransomware and Cyber Extortion: Response and Prevention

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks

Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover.

You must be ready. With this book, you will be.

Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source.

  • Understand different forms of cyber extortion and how they evolved
  • Quickly recognize indicators of compromise
  • Minimize losses with faster triage and containment
  • Identify threats, scope attacks, and locate patient zero
  • Initiate and manage a ransom negotiation--and avoid costly mistakes
  • Decide whether to pay, how to perform due diligence, and understand risks
  • Know how to pay a ransom demand while avoiding common pitfalls
  • Reduce risks of data loss and reinfection
  • Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked

This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others.

Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

See more
Current price €44.64
Original price €46.99
Save 5%
A01=Karen SprengerA01=Matt DurrinA01=Sherri DavidoffAge Group_UncategorizedAuthor_Karen SprengerAuthor_Matt DurrinAuthor_Sherri Davidoffautomatic-updateCategory1=Non-FictionCategory=UTNCategory=UTSCOP=United StatesDelivery_Delivery within 10-20 working daysLanguage_EnglishPA=In stockPrice_€20 to €50PS=Activesoftlaunch
Delivery/Collection within 10-20 working days
Product Details
  • Weight: 560g
  • Dimensions: 180 x 230mm
  • Publication Date: 09 Nov 2022
  • Publisher: Pearson Education (US)
  • Publication City/Country: United States
  • Language: English
  • ISBN13: 9780137450336

About Karen SprengerMatt DurrinSherri Davidoff

Sherri Davidoff CEO of LMG Security and author of Data Breaches has been called a security badass by the New York Times. An instructor at the renowned Black Hat cybersecurity trainings she is a GIAC-certified forensic analyst (GCFA) and penetration tester (GPEN). She holds a degree in computer science and electrical engineering from MIT. Matt Durrin the Director of Training and Research at LMG Security is a popular speaker at national conferences and training venues. His malware research has been featured on the NBC Nightly News. Karen Sprenger LMG Security's COO and chief ransomware negotiator is a noted industry expert speaker trainer and course developer with 25+ years of security/IT experience. She is a GIAC-certified forensic examiner (GCFE) and Certified Information Systems Security Professional (CISSP).

Customer Reviews

Be the first to write a review
0%
(0)
0%
(0)
0%
(0)
0%
(0)
0%
(0)
We use cookies to ensure that we give you the best experience on our website. If you continue we'll assume that you are understand this. Learn more
Accept