-
Cyber Crisis
- Protecting Your Business from Real Threats in the Virtual World
- Narrated by: Michael Butler Murray
- Length: 6 hrs and 28 mins
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Buy for $17.49
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
Listeners also enjoyed...
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
By: Matthew K. Sharp, and others
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
By: Maxie Reynolds
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books: 25 Most Common Security Threats & How To Avoid Them, 21 Steps for Implementing the NIST Cybersecurity Framework, Cryptography Fundamentals & Network Security, and How to Get into Cybersecurity Without Technical Background.
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Great Resource for CCSP Study
- By PNewton on 07-11-22
By: Ben Malisow
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
By: Matthew K. Sharp, and others
-
The Smartest Person in the Room
- The Root Cause and New Solution for Cybersecurity
- By: Christian Espinosa
- Narrated by: Kaleo Griffith
- Length: 6 hrs and 54 mins
- Unabridged
-
Overall
-
Performance
-
Story
With cyberattacks resulting in often devastating results, it’s no wonder executives hire the best and brightest of the IT world for protection. But are you doing enough? Do you understand your risks? What if the brightest aren’t always the best choice for your company? In The Smartest Person in the Room, Christian Espinosa shows you how to leverage your company’s smartest minds to your benefit and theirs. Learn from Christian’s own journey from cybersecurity engineer to company CEO.
-
-
Bland
- By Jonathan on 09-01-21
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
By: Maxie Reynolds
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
Cybersecurity Bible
- Security Threats, Frameworks, Cryptography & Network Security: 4 Books in 1
- By: Hugo Hoffman
- Narrated by: Matyas J.
- Length: 11 hrs and 27 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity Bible is a book bundle that includes four books: 25 Most Common Security Threats & How To Avoid Them, 21 Steps for Implementing the NIST Cybersecurity Framework, Cryptography Fundamentals & Network Security, and How to Get into Cybersecurity Without Technical Background.
-
-
This book is a waste of time and money
- By Richard Sikes on 04-04-21
By: Hugo Hoffman
-
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide
- 2nd Edition
- By: Ben Malisow
- Narrated by: Daniel Henning
- Length: 16 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. Covering all CCSP domains, this book walks you through architectural concepts and design requirements, cloud data security, cloud platform and infrastructure security, cloud application security, operations, and legal and compliance with real-world scenarios to help you apply your skills along the way.
-
-
Great Resource for CCSP Study
- By PNewton on 07-11-22
By: Ben Malisow
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
The Cuckoo's Egg
- Tracking a Spy Through the Maze of Computer Espionage
- By: Cliff Stoll
- Narrated by: Will Damron
- Length: 12 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Before the internet became widely known as a global tool for terrorists, one perceptive US citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" - Smithsonian.
-
-
My favorite non-fiction book!
- By Philip Lowe on 08-28-20
By: Cliff Stoll
-
The ABC of Cybersecurity
- How to Prevent Phishing & Social Engineering Attacks, Incident Management Best Practices and Cybersecurity Awareness for Employees
- By: Mike Miller
- Narrated by: Scott Clem
- Length: 13 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Designed to teach you how to protect yourself and your business from the most common cyberattacks, this comprehensive bundle includes three books: How to Prevent Phishing & Social Engineering Attacks, Incident Management Best Practices, and Cybersecurity Awareness for Employees.
By: Mike Miller
-
Cybersecurity Leadership
- Powering the Modern Organization
- By: Mansur Hasib
- Narrated by: Mansur Hasib
- Length: 7 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence, the implementation of cybersecurity as a people-powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. This book enables newcomers and business professionals, as well as seasoned cybersecurity practitioners and marketers, to understand and to explain the discipline to anyone.
-
-
CIOs and CISOs should read this book...
- By Chad L Fulgham on 08-12-15
By: Mansur Hasib
-
This Is How They Tell Me the World Ends
- The Cyberweapons Arms Race
- By: Nicole Perlroth
- Narrated by: Allyson Ryan
- Length: 18 hrs and 32 mins
- Unabridged
-
Overall
-
Performance
-
Story
Zero day: a software bug that allows a hacker to break into your devices and move around undetected. One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election and shut down the electric grid (just ask Ukraine). For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world’s dominant hoarder of zero days.
-
-
Decent story, cringeworthy narration and editing
- By since1968 on 02-13-21
By: Nicole Perlroth
-
How to Measure Anything in Cybersecurity Risk
- By: Douglas W. Hubbard, Richard Seiersen
- Narrated by: Patrick Cronin
- Length: 10 hrs and 21 mins
- Unabridged
-
Overall
-
Performance
-
Story
Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing - as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
-
-
better know math and statistics before diving in
- By Andy on 03-28-17
By: Douglas W. Hubbard, and others
-
Blue Ocean Strategy, Expanded Edition
- How to Create Uncontested Market Space and Make the Competition Irrelevant
- By: W. Chan Kim, Renee Mauborgne
- Narrated by: Roger Wayne
- Length: 8 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this perennial best seller, embraced by organizations and industries worldwide, globally preeminent management thinkers W. Chan Kim and Renee Mauborgne challenge everything you thought you knew about the requirements for strategic success. Recognized as one of the most iconic and impactful strategy books ever written, Blue Ocean Strategy, now updated with fresh content from the authors, argues that cutthroat competition results in nothing but a bloody red ocean of rivals fighting over a shrinking profit pool.
-
-
Profoundly Insightful
- By James on 10-29-20
By: W. Chan Kim, and others
-
Cyber Privacy
- Who Has Your Data and Why You Should Care
- By: April Falcon Doss
- Narrated by: Chloe Cannon
- Length: 11 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
You shouldn't have to be a privacy expert to understand what happens to your data. April Falcon Doss, a privacy expert and former NSA and Senate lawyer, has seen this imbalance in action. In Cyber Privacy, Doss demystifies the digital footprints we leave in our daily lives and reveals how our data is being used - sometimes against us - by the private sector, the government, and even our employers and schools.
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Eugene on 08-08-20
By: Richard A. Clarke, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it. In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
BY FAR the best book to date on this topic!
- By aaron on 07-09-18
By: David E. Sanger
-
The Cybersecurity Playbook
- How Every Leader and Employee Can Contribute to a Culture of Security
- By: Allison Cerra
- Narrated by: Chloe Cannon
- Length: 4 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Cybersecurity Playbook is the step-by-step guide to protecting your organization from unknown threats and integrating good security habits into everyday business situations. This audiobook provides clear guidance on how to identify weaknesses, assess possible threats, and implement effective policies. Recognizing that an organization's security is only as strong as its weakest link, this audiobook offers specific strategies for employees at every level.
-
-
good for non technical, a bit too much filler
- By Carolinian on 12-16-20
By: Allison Cerra
Publisher's Summary
Based on news reports, you might think there's a major cybersecurity threat every four to five months. In reality, there's a cybersecurity attack happening every minute of every day.
Today, we live our lives - and conduct our business - online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments, and best practices. But as you read this, there is a 70 percent chance that your data is compromised...you just don't know it yet.
In Cyber Crisis, Eric Cole gives listeners a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience, Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves.
No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives is both critical and vulnerable, and sooner or later, you or your company will be a target.
More from the same
What listeners say about Cyber Crisis
Average Customer RatingsReviews - Please select the tabs below to change the source of reviews.
-
Overall
-
Performance
-
Story
- elitegunslinger
- 04-27-22
Great insightful resource
Concise and straight to the point, great examples and suggestions to secure an environment from a high level. Check this out, you won't regret it.
-
Overall
-
Performance
-
Story
- Amazon Customer
- 03-19-22
Great info!
I have always admired Dr. Cole and he did not disappoint me with this book.
Great read for all levels
-
Overall
-
Performance
-
Story
- Amazon Customer
- 11-13-21
Extremely Informative and Insightful
I’ve been working in IT for over 25 years specifically in the Application Integration space and this book has increased my awareness to the cyber security challenges we are facing globally. I highly recommend!
-
Overall
-
Performance
-
Story
- Carlos Rodriguez
- 07-17-21
Lots of good true stories
Dr. Cole uses many facts and true stories to help the reader understand the risk and he also provides practical examples of how to treat such risk. I thought about four star because I think that the book sometimes uses a bint of FUD but being in the space I cannot negate the facts.
Great book for your executive leadership team.
-
Overall
-
Performance
-
Story

- aaran
- 07-09-21
Most read
Short and to the point. Great insight. You may think you know everything in this book, but until you read it, you don’t.