
Cyber Mayday and the Day After
A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
No se pudo agregar al carrito
Add to Cart failed.
Error al Agregar a Lista de Deseos.
Error al eliminar de la lista de deseos.
Error al añadir a tu biblioteca
Error al seguir el podcast
Error al dejar de seguir el podcast
$0.99/mes por los primeros 3 meses

Compra ahora por $17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrado por:
-
Chris Reilly
Acerca de esta escucha
Digital transformation and cyber insecurity are two global trends that converged in 2020. The COVID-19 pandemic has accelerated these global challenges into paradigm-changing realities that threaten to destroy every company, government, network, and individual. But what can be done to embrace the accelerating digital disruption and at the same time manage the explosion of vulnerabilities, cyber threats, and business risks? What strategies are enabling technology leaders to thrive in this fast-changing landscape and stay calm in the midst of a world filled with ransomware, online deception, and nation-state hackers?
Cyber Mayday and the Day After is a business book, a communication toolkit offering stories, strategies, tactics, and outlook with key extracts and lessons learned from top C-executive leaders around the world. Some of these insights come from former FBIs, NASA agents, government CISOs, and high-profile CxOs, offering practical examples and workable solutions for leaders to succeed in the 21st century. This book unpacks key learnings on leadership and influence. It equips listeners with the mastery of their stakeholders and explores how to effect a cultural change within organizations.
©2022 John Wiley & Sons, Inc. (P)2021 Ascent AudioLos oyentes también disfrutaron...
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- De: Gene Kim, Kevin Behr, George Spafford
- Narrado por: Chris Ruen
- Duración: 14 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- De Peter en 11-23-15
De: Gene Kim, y otros
-
Battlefield Cyber
- How China and Russia Are Undermining Our Democracy and National Security
- De: Michael G. McLaughlin, William Holstein
- Narrado por: Steve Menasche
- Duración: 11 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response.
-
-
Lack case studies on Russian threats and attacks.
- De MommyCEO en 03-14-24
De: Michael G. McLaughlin, y otros
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- De: Christian Brose
- Narrado por: Christian Brose
- Duración: 9 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network"—the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- De Tomas Singliar en 06-06-20
De: Christian Brose
-
Soundtracks
- The Surprising Solution to Overthinking
- De: Jon Acuff
- Narrado por: Jon Acuff
- Duración: 5 h y 14 m
- Versión completa
-
General
-
Narración:
-
Historia
Overthinking isn't a personality trait. It's the sneakiest form of fear. It steals time, creativity, and goals. It's the most expensive, least productive thing companies invest in without even knowing it. And it's an epidemic. When New York Times best-selling author Jon Acuff changed his life by transforming his overthinking, he wondered if other people might benefit from what he discovered. He commissioned a research study to ask 10,000 people if they struggle with overthinking too, and 99.5 percent said, "Yes!"
-
-
Overthinking: Superpower > Superproblem
- De Marshall Coleman en 04-28-21
De: Jon Acuff
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- De: Gene Kim, Kevin Behr, George Spafford
- Narrado por: Chris Ruen
- Duración: 14 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- De Peter en 11-23-15
De: Gene Kim, y otros
-
Battlefield Cyber
- How China and Russia Are Undermining Our Democracy and National Security
- De: Michael G. McLaughlin, William Holstein
- Narrado por: Steve Menasche
- Duración: 11 h y 59 m
- Versión completa
-
General
-
Narración:
-
Historia
The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response.
-
-
Lack case studies on Russian threats and attacks.
- De MommyCEO en 03-14-24
De: Michael G. McLaughlin, y otros
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- De: Andy Greenberg
- Narrado por: Mark Bramhall
- Duración: 12 h y 2 m
- Versión completa
-
General
-
Narración:
-
Historia
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- De ndru1 en 11-12-19
De: Andy Greenberg
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- De: Christian Brose
- Narrado por: Christian Brose
- Duración: 9 h y 44 m
- Versión completa
-
General
-
Narración:
-
Historia
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network"—the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- De Tomas Singliar en 06-06-20
De: Christian Brose
-
Soundtracks
- The Surprising Solution to Overthinking
- De: Jon Acuff
- Narrado por: Jon Acuff
- Duración: 5 h y 14 m
- Versión completa
-
General
-
Narración:
-
Historia
Overthinking isn't a personality trait. It's the sneakiest form of fear. It steals time, creativity, and goals. It's the most expensive, least productive thing companies invest in without even knowing it. And it's an epidemic. When New York Times best-selling author Jon Acuff changed his life by transforming his overthinking, he wondered if other people might benefit from what he discovered. He commissioned a research study to ask 10,000 people if they struggle with overthinking too, and 99.5 percent said, "Yes!"
-
-
Overthinking: Superpower > Superproblem
- De Marshall Coleman en 04-28-21
De: Jon Acuff
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- De: George Finney, John Kindervag - foreword
- Narrado por: Daniel Thomas May
- Duración: 7 h y 51 m
- Versión completa
-
General
-
Narración:
-
Historia
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- De Jordan en 10-16-22
De: George Finney, y otros
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- De: Matthew K. Sharp, Kyriakos Lambros
- Narrado por: Christopher Grove
- Duración: 13 h y 7 m
- Versión completa
-
General
-
Narración:
-
Historia
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- De Gilan en 01-31-25
De: Matthew K. Sharp, y otros
-
The Art of Attack
- Attacker Mindset for Security Professionals
- De: Maxie Reynolds
- Narrado por: Stephanie Dillard
- Duración: 9 h y 50 m
- Versión completa
-
General
-
Narración:
-
Historia
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- De Anonymous User en 10-19-22
De: Maxie Reynolds
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- De: Andy Greenberg
- Narrado por: Ari Fliakos
- Duración: 10 h y 46 m
- Versión completa
-
General
-
Narración:
-
Historia
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- De Mike Reaves en 01-28-23
De: Andy Greenberg
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- De: Scott J. Shapiro
- Narrado por: Jonathan Todd Ross
- Duración: 15 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- De Ken Vanden branden en 07-23-23
De: Scott J. Shapiro
-
Nonprofit Board Success
- How to Build a Board of Directors So Good That Even the Top CEOs Would Be Jealous
- De: James Ruell
- Narrado por: Robert Grindley
- Duración: 4 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Written by James Ruell, who has served as director and vice-treasurer of an award-winning charity, Nonprofit Board Success gives practical advice and proven techniques for building a top-notch board of directors—one that will make you the envy of CEOs everywhere.
-
-
Just what I was looking for
- De Jeremy B en 12-11-23
De: James Ruell
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- De: Chris Moschovitis
- Narrado por: Sean Pratt
- Duración: 9 h y 9 m
- Versión completa
-
General
-
Narración:
-
Historia
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- De Roger Swanson en 07-19-18
-
Recoding America
- Why Government Is Failing in the Digital Age and How We Can Do Better
- De: Jennifer Pahlka
- Narrado por: Jennifer Pahlka
- Duración: 9 h y 37 m
- Versión completa
-
General
-
Narración:
-
Historia
A bold call to reexamine how our government operates—and sometimes fails to—from President Obama’s former deputy chief technology officer and the founder of Code for America.
-
-
Very good, minimally partisan.
- De 95Rb35 en 11-25-23
De: Jennifer Pahlka
-
The Big Nine
- How the Tech Titans and Their Thinking Machines Could Warp Humanity
- De: Amy Webb
- Narrado por: Amanda Dolan
- Duración: 9 h y 35 m
- Versión completa
-
General
-
Narración:
-
Historia
In this book, Amy Webb reveals the pervasive, invisible ways in which the foundations of AI - the people working on the system, their motivations, the technology itself - is broken. Within our lifetimes, AI will, by design, begin to behave unpredictably, thinking and acting in ways which defy human logic. The big nine corporations may be inadvertently building and enabling vast arrays of intelligent systems that don't share our motivations, desires, or hopes for the future of humanity.
-
-
Interesting but Frustrating
- De Kathy en 03-26-19
De: Amy Webb
-
Cybersecurity Leadership
- Powering the Modern Organization
- De: Mansur Hasib
- Narrado por: Mansur Hasib
- Duración: 7 h y 3 m
- Versión completa
-
General
-
Narración:
-
Historia
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- De Chad L Fulgham en 08-12-15
De: Mansur Hasib
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- De: SentinelOne Publication, Migo Kedem - introduction
- Narrado por: SentinelOne
- Duración: 53 m
- Versión completa
-
General
-
Narración:
-
Historia
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- De Brad en 06-10-23
De: SentinelOne Publication, y otros
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- De: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrado por: Gwen Bettwy
- Duración: 5 h y 55 m
- Versión completa
-
General
-
Narración:
-
Historia
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- De SMB en 09-21-21
De: Gwen Bettwy, y otros
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- De: Richard A. Clarke, Robert K. Knake
- Narrado por: Marc Cashman
- Duración: 12 h y 8 m
- Versión completa
-
General
-
Narración:
-
Historia
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- De Thomas Rose en 08-08-20
De: Richard A. Clarke, y otros