You'll See This Message When It Is Too Late
The Legal and Economic Aftermath of Cybersecurity Breaches
Failed to add items
Add to basket failed.
Add to wishlist failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
£0.00 for first 30 days
Buy Now for £20.99
No valid payment method on file.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Kate Reading
-
By:
-
Josephine Wolff
About this listen
Cybersecurity incidents make the news with startling regularity. Each breach - the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump - makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that.
In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks - financial gain, espionage, and public humiliation of the victims - that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns.
The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at US-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
©2018 Josephine Wolff (P)2018 Blackstone Audio, Inc.What listeners say about You'll See This Message When It Is Too Late
Average customer ratingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- Anonymous User
- 10-01-22
The title says it all
A good, informative book that everyone should read /hear both for info sec management and general interest.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
-
Overall
-
Performance
-
Story
- Mr
- 19-01-20
Surprisingly good despite the title
Using detailed case studies this audio book is an analysis of the dynamics of data breaches, defender VS attacker, collective action by stakeholders VS independent entities acting in self interest. Questions of liability in the wake of data breaches are answered through the lens of the case studies.
**Ignore the title** of this audio book and buy it anyway.
Notwithstanding the silly sensationalist title of this book which doesn't match the high quality of the content, this is a sober analysis that answers the questions it poses.
I like the fact this book doesn't suffer a victim complex .... so many books complaining not everyone is doing it right and if only they could have read their book the world would be wonderful... So many authors of business books seem to think if we aren't being constantly told this book will solve world hunger then we won't buy the book.
The title must have been written by someone other than the author because clearly it tries to be sensationalist, whereas the author thankfully is clearly rational and knowledgeable.
Message to the author: thanks for writing this, found it interesting and helpful, however next time make sure you have the rights to name the title
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!
2 people found this helpful
-
Overall
-
Performance
-
Story
- Goldfrapper
- 27-04-22
There's two books here...
One is a story of the biggest data breaches of recent times, and if that had been the largest theme of the book, it would have been exciting, compelling, technically challenging, and overall a triumph of nerdy tales of misadventure.
Unfortunately, the main thrust of this book is not the breaches themselves (though they are covered in detail), it's the twin themes of (1) the aftermath of the breaches - which would certainly have been a necessary postscript to each chapter; (2) who was to blame for each breach in the sense of not taking the necessary security precautions, and - a point hammered home ruthlessly and repetitively - how effective are those security precautions in isolation when faced with determined attackers? As such, the book might appeal in a doctrinaire way to companies that have been the subject of breaches, their IT managers and departments, and people responsible for the allocation of budgets especially in relation to the economics of instituting policies as opposed to the possible costs to a company of a breach. But this made the book rather dry and boring, once the account of the breach in question had been outlined.
If you're an IT manager for a company, this might be a good textbook for you. If you're an ordinary reader with some knowledge of computing, the in-depth post-breach analysis is wearisome.
Something went wrong. Please try again in a few minutes.
You voted on this review!
You reported this review!