Facing Cyber Threats Head On: Protecting Yourself and Your Business
Written by Brian Minick
Narrated by Patrick Lawlor
4.5/5
()
About this audiobook
News breaks all the time that hackers have attacked another company. Media outlets regularly cover cyber events. The President issues executive orders, and Congress explores cyber legislation. With all these events happening, business leaders must ask: what does this mean for my business and me?
Facing Cyber Threats Head On looks at cyber security from a business leader perspective. By avoiding deep technical explanations of “how” and focusing on the “why” and “so what,” this book guides readers to a better understanding of the challenges that cyber security presents to modern business, and shows them what they can do as leaders to solve these challenges.
Facing Cyber Threats Head On explains that technology is not the answer to cyber security issues. People, not technology, are behind emerging cyber risks. Understanding this brings to light that cyber protection is not a battle of technology against technology, but people against people. Based on this, a new approach is required—one that balances business risk with the cost of creating defenses that can change as quickly and often as attackers can. Readers will find here a ready resource for understanding the why and how of cyber risks, and will be better able to defend themselves and their businesses against them in the future.
Brian Minick
Brian Minick is the Co-Founder and CEO of Morphick Cyber Security. Brian brings over 15 years of diverse information technology and cyber security leadership and experience. Before founding Morphick, he held the title of Chief Information Security Officer at General Electric’s Aviation, Energy and Transportation businesses where he was responsible for developing and implementing advanced cyber-security strategies. His approach was integral to protecting the strategy, growth and resources of a multi-billion-dollar, worldwide corporation. Brian has also consulted with the White House and State Department on cyber policy relating to the protection of American intellectual property. He has also consulted with the DoD, CIO of the Pentagon, and members of the NSA on best practices, tools and techniques for cyber attack detection and deterrence. In addition, he led efforts to implement protocols for mitigating advanced persistent threats for an organization of more than 135,000 employees worldwide.
Related to Facing Cyber Threats Head On
Related audiobooks
Cyber Security: How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond Rating: 4 out of 5 stars4/5Cybersecurity Program Development for Business: The Essential Planning Guide Rating: 5 out of 5 stars5/5Hacking the Hacker: Learn From the Experts Who Take Down Hackers Rating: 4 out of 5 stars4/5Cybersecurity and Cyberwar: What Everyone Needs to Know Rating: 4 out of 5 stars4/5Becoming an Ethical Hacker Rating: 5 out of 5 stars5/5CYBERSECURITY FOR BEGINNERS: HOW TO DEFEND AGAINST HACKERS & MALWARE Rating: 4 out of 5 stars4/5Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World Rating: 5 out of 5 stars5/5Cryptography: The Key to Digital Security, How It Works, and Why It Matters Rating: 5 out of 5 stars5/5CYBERSECURITY and CYBERWAR: Gain the Experience to Navigate Critical Cybersecurity Challenges Rating: 0 out of 5 stars0 ratingsWhat is the Dark Web?: The truth about the hidden part of the internet Rating: 4 out of 5 stars4/5Exploding Data: Reclaiming Our Cyber Security in the Digital Age Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals Rating: 4 out of 5 stars4/5Cybersecurity: On Threats Surfing the Internet and Social Media Rating: 0 out of 5 stars0 ratingsRansomware Protection Playbook Rating: 5 out of 5 stars5/5Cybersecurity: The Insights You Need from Harvard Business Review Rating: 5 out of 5 stars5/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5HACKING: Hacking Firewalls & Bypassing Honeypots Rating: 5 out of 5 stars5/5You CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsDigital Resilience: Is Your Company Ready for the Next Cyber Threat? Rating: 4 out of 5 stars4/5HACKING: Social Engineering Attacks, Techniques & Prevention Rating: 5 out of 5 stars5/5A Vulnerable System: The History of Information Security in the Computer Age Rating: 5 out of 5 stars5/5Cybercrime Investigators Handbook Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 4 out of 5 stars4/5The Art of Deception: Controlling the Human Element of Security Rating: 4 out of 5 stars4/5Project Zero Trust: A Story about a Strategy for Aligning Security and the Business Rating: 5 out of 5 stars5/5The Security Culture Playbook: An Executive Guide To Reducing Risk and Developing Your Human Defense Layer Rating: 5 out of 5 stars5/5Greatest Hackers in the History Rating: 4 out of 5 stars4/5
Internet & Web For You
30 Passive Income Ideas Rating: 4 out of 5 stars4/5How to Be Fine: What We Learned by Living by the Rules of 50 Self-Help Books Rating: 4 out of 5 stars4/5The YouTube Formula: How Anyone Can Unlock the Algorithm to Drive Views, Build an Audience, and Grow Revenue Rating: 5 out of 5 stars5/5Tor Darknet Bundle (5 in 1): Master the Art of Invisibility Rating: 5 out of 5 stars5/5Web3: Charting the Internet's Next Economic and Cultural Frontier Rating: 0 out of 5 stars0 ratingsDarknet: A Beginner's Guide to Staying Anonymous Online Rating: 5 out of 5 stars5/5SEO 2021: Learn search engine optimization with smart internet marketing strategies Rating: 5 out of 5 stars5/5AWS: The Complete Beginner to Advanced Guide for Amazon Web Service — The Ultimate Tutorial Rating: 5 out of 5 stars5/5Ten Arguments for Deleting Your Social Media Accounts Right Now Rating: 4 out of 5 stars4/5The Darkest Web: Drugs, Death and Destroyed Lives . . . the Inside Story of the Internet's Evil Twin Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking 2nd Edition Rating: 5 out of 5 stars5/5How to Start a Podcast: An Essential Guide to Profitable Podcasting for Beginners Rating: 5 out of 5 stars5/5Invisibility Toolkit Rating: 5 out of 5 stars5/5The Dark Net: Inside the Digital Underworld Rating: 4 out of 5 stars4/5Blog, Inc.: Blogging for Passion, Profit, and to Create Community Rating: 4 out of 5 stars4/5How Design Makes The World Rating: 5 out of 5 stars5/5AWS: The Most Complete Guide to Amazon Web Services from Beginner to Advanced Level Rating: 3 out of 5 stars3/5Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous Rating: 4 out of 5 stars4/5HACKING: How to Hack Web Apps Rating: 5 out of 5 stars5/5Podcast: The Ultimate Guide To Podcasting Rating: 5 out of 5 stars5/5How to Do Nothing: Resisting the Attention Economy Rating: 4 out of 5 stars4/5Protecting Your Internet Identity: Are You Naked Online? Rating: 0 out of 5 stars0 ratingsEverybody Has a Podcast (Except You): A How-To Guide from the First Family of Podcasting Rating: 5 out of 5 stars5/5A Body to Love: Cultivate Community, Body Positivity, and Self-Love in the Age of Social Media Rating: 4 out of 5 stars4/5Platform: Get Noticed in a Noisy World Rating: 4 out of 5 stars4/5Nine Algorithms That Changed the Future: The Ingenious Ideas That Drive Today's Computers Rating: 5 out of 5 stars5/5
Reviews for Facing Cyber Threats Head On
27 ratings4 reviews
- Rating: 5 out of 5 stars5/5The content was informative and easy to understand. However, the digital book had some issues toward the end, with loading a bookmark and keeping the book at the same place.
- Rating: 5 out of 5 stars5/5Must read/listen for all security professionals and leaders. Gem of advice on how to combine people, process and technology to defend against advanced threats.
- Rating: 4 out of 5 stars4/5Really good points made in the cyber-security field. Definitely worth reading / listening to.
- Rating: 5 out of 5 stars5/5WOW ! The Eternal Battle goes on Good /Evil, at much greater scale.
I don’t know if I want a self driven vehicle that can be hacked .
Are we all at risk, the Big Fish, the small fish,How safe are our Banks accounts ? My Small Business that is responsible and holds hundreds of people’s personal And sensitive information , my IT security department of two people , how can we protect our company from Cyber attack?
Lots of information on this book to race awareness of what’s already here and what’s To come on the Cybercrime future .
Are we safe at any Level?
Great Book!