0%

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks

Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether youll ever recover.

You must be ready. With this book, you will be.

Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source.

  • Understand different forms of cyber extortion and how they evolved

  • Quickly recognize indicators of compromise

  • Minimize losses with faster triage and containment

  • Identify threats, scope attacks, and locate “patient zero”

  • Initiate and manage a ransom negotiation--and avoid costly mistakes

  • Decide whether to pay, how to perform due diligence, and understand risks

  • Know how to pay a ransom demand while avoiding common pitfalls

  • Reduce risks of data loss and reinfection

  • Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked

This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others.

Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Table of Contents

  1. Cover Page
  2. About This eBook
  3. Halftitle Page
  4. Title Page
  5. Copyright Page
  6. Pearson’s Commitment to Diversity, Equity, and Inclusion
  7. Dedication Page
  8. Contents
  9. Preface
  10. Acknowledgments
  11. About the Authors
  12. Chapter 1. Impact
  13. Chapter 2. Evolution
  14. Chapter 3. Anatomy of an Attack
  15. Chapter 4. The Crisis Begins!
  16. Chapter 5. Containment
  17. Chapter 6. Investigation
  18. Chapter 7. Negotiation
  19. Chapter 8. Payment
  20. Chapter 9. Recovery
  21. Chapter 10. Prevention
  22. Afterword
  23. Checklist A. Cyber Extortion Response
  24. Checklist B. Resources to Create in Advance
  25. Checklist C. Planning Your Response
  26. Checklist D. Running an Effective Cybersecurity Program
  27. Index
  28. Code Snippets