The Ransomware Threat Landscape: Prepare for, recognise and survive ransomware attacks
Written by Alan Calder
Narrated by Stephen Perring
()
Currently unavailable
Currently unavailable
About this audiobook
Ransomware will cost companies around the world $20 billion in 2021. Prepare for, recognise and survive ransomware attacks with this essential guide which sets out clearly how ransomware works, to help business leaders better understand the strategic risks, and explores measures that can be put in place to protect the organisation.
Alan Calder
Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.
More audiobooks from Alan Calder
EU GDPR – An international guide to compliance Rating: 5 out of 5 stars5/5NIST Cybersecurity Framework: A pocket guide Rating: 0 out of 5 stars0 ratingsISO 22301: 2019 - An introduction to a business continuity management system (BCMS) Rating: 0 out of 5 stars0 ratingsCyber Resilience: Defence-in-depth principles Rating: 0 out of 5 stars0 ratingsCyber Security: Essential principles to secure your organisation Rating: 5 out of 5 stars5/5
Related to The Ransomware Threat Landscape
Related audiobooks
The Cyber Conundrum: How Do We Fix Cybersecurity? Rating: 4 out of 5 stars4/5Zero Trust and Third-Party Risk: Reduce the Blast Radius Rating: 0 out of 5 stars0 ratingsHackable: How to Do Application Security Right Rating: 0 out of 5 stars0 ratingsRansomware Protection Playbook Rating: 5 out of 5 stars5/5Cybersecurity: On Threats Surfing the Internet and Social Media Rating: 0 out of 5 stars0 ratingsPhishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails Rating: 4 out of 5 stars4/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/58 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5Digital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5Cybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratingsWell Aware: Master the Nine Cybersecurity Habits to Protect Your Future Rating: 5 out of 5 stars5/5A Leader's Guide to Cybersecurity: Why Boards Need to Lead-And How to Do It Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners: Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide Rating: 0 out of 5 stars0 ratingsCYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsCISSP: 3 in 1- Beginner's Guide + Tips and Tricks + Simple and Effective Strategies to Learn About Information Systems Security Rating: 0 out of 5 stars0 ratingsAlice and Bob Learn Application Security Rating: 5 out of 5 stars5/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsThe Cyber-Elephant In The Boardroom: Cyber-Accountability With The Five Pillars Of Security Framework Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratingsCryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5ISO/IEC 27001:2022: An introduction to information security and the ISMS standard Rating: 5 out of 5 stars5/5Obfuscation: A User's Guide for Privacy and Protest Rating: 4 out of 5 stars4/5
Security For You
The Ransomware Hunting Team: A Band of Misfits' Improbable Crusade to Save the World from Cybercrime Rating: 4 out of 5 stars4/5A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back Rating: 4 out of 5 stars4/5The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage Rating: 5 out of 5 stars5/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5CompTIA Security+ All-in-One Exam Guide, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Cloudmoney: Cash, Cards, Crypto, and the War for Our Wallets Rating: 4 out of 5 stars4/5CompTIA A+ Certification All-in-One Exam Guide, Eleventh Edition (Exams 220-1101 & 220-1102) Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5CISSP All-in-One Exam Guide, Ninth Edition Rating: 5 out of 5 stars5/5Cybersecurity: Learn Fast how to Become an InfoSec Pro 3 Books in 1 Rating: 0 out of 5 stars0 ratingsHacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide 9th Edition Rating: 5 out of 5 stars5/5Social Engineering: The Art of Human Hacking Rating: 5 out of 5 stars5/5Darknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5COMPTIA NETWORK+: A Comprehensive Beginners Guide to Learn About The CompTIA Network+ Certification from A-Z Rating: 0 out of 5 stars0 ratingsUnmasking the Social Engineer: The Human Element of Security Rating: 5 out of 5 stars5/5Certified Information Security Manager CISM Study Guide Rating: 5 out of 5 stars5/5If It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5The Wires of War: Technology and the Global Struggle for Power Rating: 4 out of 5 stars4/5
Reviews for The Ransomware Threat Landscape
0 ratings0 reviews