Cyber Intelligence Driven Risk
How to Build, Deploy, and Use Cyber Intelligence for Improved Business Risk Decisions
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $13.75
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Walter Dixon
About this listen
Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives and risk managers face: How can we weave information security into our business decisions to minimize overall business risk?
In today's complex digital landscape, business decisions and cyber event responses have implications for information security that high-level actors may be unable to foresee. What we need is a cybersecurity command center capable of delivering, not just data, but concise, meaningful interpretations that allow us to make informed decisions.
Building, buying, or outsourcing a CI-DR program is the answer. In his work with executives at leading financial organizations and with the US military, author Richard O. Moore III has tested and proven this next-level approach to intelligence and risk. This book is a guide to: building, buying, or outsourcing a cyber intelligence-driven risk program; understanding the functional capabilities needed to sustain the program; using cyber intelligence to support enterprise risk management; reducing loss from cyber events by building new organizational capacities; and supporting mergers and acquisitions with predictive analytics.
©2021 John Wiley & Sons, Inc. (P)2021 Gildan MediaListeners also enjoyed...
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- By: Recorded Future
- Narrated by: Chris Pace
- Length: 2 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
-
Basic information for starters
- By SUNIL VARKEY on 03-11-19
By: Recorded Future
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- By: Recorded Future
- Narrated by: George Mount
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
-
Good overview
- By Bryan on 06-22-23
By: Recorded Future
-
Algorithms to Live By
- The Computer Science of Human Decisions
- By: Brian Christian, Tom Griffiths
- Narrated by: Brian Christian
- Length: 11 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
From finding a spouse to finding a parking spot, from organizing one's inbox to understanding the workings of human memory, Algorithms to Live By transforms the wisdom of computer science into strategies for human living.
-
-
Great listen, just don't expect tips!
- By Adam Hosman on 08-07-17
By: Brian Christian, and others
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
The Threat Intelligence Handbook
- A Practical Guide for Security Teams to Unlocking the Power of Intelligence
- By: Recorded Future
- Narrated by: Chris Pace
- Length: 2 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s easy to find descriptions of what threat intelligence is. But it’s harder to learn how to use it to truly make your organization safe from cybercriminals. How can threat intelligence strengthen all the teams in a cybersecurity organization? This audiobook answers this question. It reviews the kinds of threat intelligence that are useful to security teams and how each team can use that intelligence to solve problems and address challenges.
-
-
Basic information for starters
- By SUNIL VARKEY on 03-11-19
By: Recorded Future
-
The Security Intelligence Handbook, Third Edition
- How to Disrupt Adversaries and Reduce Risk with Security Intelligence
- By: Recorded Future
- Narrated by: George Mount
- Length: 3 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Security Intelligence Handbook is your definitive guide for proactive risk reduction. This edition has been updated to include a new foreword about the unprecedented state of cyber and physical security, a sharpened focus on six critical security functions, an expanded discussion of security intelligence’s applications for specific teams, and a new conclusion that explores the results you may achieve with security intelligence.
-
-
Good overview
- By Bryan on 06-22-23
By: Recorded Future
-
Algorithms to Live By
- The Computer Science of Human Decisions
- By: Brian Christian, Tom Griffiths
- Narrated by: Brian Christian
- Length: 11 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
From finding a spouse to finding a parking spot, from organizing one's inbox to understanding the workings of human memory, Algorithms to Live By transforms the wisdom of computer science into strategies for human living.
-
-
Great listen, just don't expect tips!
- By Adam Hosman on 08-07-17
By: Brian Christian, and others
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
Social Engineering, Second Edition
- The Science of Human Hacking
- By: Christopher Hadnagy
- Narrated by: Christopher Hadnagy
- Length: 9 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire - why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly used techniques that fool even the most robust security personnel and reveals how these techniques have been used in the past.
-
-
Eye opening listen
- By RM on 04-10-19
-
Data Science
- By: John D. Kelleher, Brendan Tierney
- Narrated by: Chris Sorensen
- Length: 5 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
It has never been easier for organizations to gather, store, and process data. Use of data science is driven by the rise of big data and social media, the development of high-performance computing, and the emergence of such powerful methods for data analysis and modeling as deep learning. Data science encompasses a set of principles, problem definitions, algorithms, and processes for extracting non-obvious and useful patterns from large datasets.
-
-
performance is borderline unlistenable
- By jlouviere on 01-14-19
By: John D. Kelleher, and others
-
Cryptology for Beginners
- #1 Guide for Security, Encryption, Crypto, Algorithms and Python
- By: Jake T Mills
- Narrated by: Tom Brooks
- Length: 3 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In a world where data flows freely and communication spans the globe, the need for secure and private communication has never been more critical. This book invites you on an illuminating journey into the captivating realm of secure communication, demystifying the intricate techniques that have protected secrets and guarded information for centuries.
-
-
Strongly recommend
- By Anonymous User on 09-05-23
By: Jake T Mills
-
AWS Certified Developer Associate
- Step by Step Certification Study Guide, to Pass the Developers Exam with Confidence
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 3 hrs and 43 mins
- Unabridged
-
Overall
-
Performance
-
Story
Are you aspiring to become an AWS Certified Developer? Are you looking for a comprehensive resource to prepare for the AWS Certified Developer exam? Look no further! This book is your ultimate guide to acing the AWS Certified Developer certification by providing you with a robust set of practice test questions and detailed answers to help you succeed.
-
-
Read by AI
- By Luke on 06-22-24
By: Jamie Murphy
-
Microsoft Certified Azure Administrator
- The Ultimate Guide to Practice Test Questions, Answers, and Master the Associate Exam
- By: Jamie Murphy
- Narrated by: Tom Brooks
- Length: 5 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Whether you're an Azure enthusiast aiming to validate your skills or an IT professional seeking to enhance your career prospects, this book will empower you to become a certified Azure Administrator Associate. With a solid grasp of Azure's key principles and hands-on expertise, you'll be well-prepared to meet the growing demand for Azure administrators in today's competitive job market. Start your journey to certification success today.
-
-
Aspiring
- By Anonymous User on 11-27-23
By: Jamie Murphy
-
Accelerate: Building and Scaling High Performing Technology Organizations
- By: Nicole Forsgren PhD, Jez Humble, Gene Kim
- Narrated by: Nicole Forsgren
- Length: 4 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
How can we apply technology to drive business value? For years we've been told that the performance of software delivery teams doesn't matter - that it can't provide a competitive advantage to our companies. Through four years of groundbreaking research to include data collected from the State of DevOps reports conducted with Puppet, Dr. Nicole Forsgren, Jez Humble, and Gene Kim set out to find a way to measure software delivery performance - and what drives it - using rigorous statistical methods. This book presents both the findings and the science behind that research, making the information accessible for listeners to apply in their own organizations.
-
-
Only if you have nothing else to do
- By Gvido on 07-24-18
By: Nicole Forsgren PhD, and others
-
Machine Learning 2020
- Guide to Understant Big Data Analytics
- By: Myles Bellisario
- Narrated by: Cass Merry
- Length: 3 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
Machine learning is a use of artificial intelligence (AI) that gives software the capacity to naturally learn and improve without being unequivocally modified. Machine learning centers around the improvement of computer programs that can get to data and use it to learn for themselves. The way toward learning starts with perceptions or data - for example, models, direct understanding, or guidance, so as to search for designs in data and settle on better choices later, depending on the models that we give.
By: Myles Bellisario
-
The Online Business Academy for AI
- A Modernized Artificial Intelligence Guide for Beginners to Create New Ideas, Improve, and Maximize Productivity with Professional Content and Copy That Sells
- By: Thomas Bourne
- Narrated by: Juanelle Louise Holl
- Length: 6 hrs and 11 mins
- Unabridged
-
Overall
-
Performance
-
Story
Is AI something you’ve heard a lot about but you literally have zero ideas on how to even get started with it? If you want to make moves in the world of business and start bringing in 10 times as more money to your online business, everyone will tell you to use AI. You’ll also be sold the AI dream if you say you want to progress in your career faster than your rivals and find a new way to cruise through your to-do list while making it look easy.
-
-
VERY basic and repetitive
- By AndrewRez on 12-24-23
By: Thomas Bourne
-
Computer Networking First Step
- The Essential Guide to Networking to Introduce Yourself to The Computer Network Through a Top-Down Approach and Various Infrastructures (Programming)
- By: Tim Wired
- Narrated by: Jacob McNatt
- Length: 3 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
While you may have never thought of networking in detail, this book will introduce you to the basics of networking, the different types of networks available, the types of network topologies that you will encounter, the concept of server virtualization, and details of how to handle network breaches.
-
-
If you don't have a text copy of the book, beware
- By A Consumer on 04-08-20
By: Tim Wired
-
Team Topologies: Organizing Business and Technology Teams for Fast Flow
- By: Matthew Skelton, Manuel Pais
- Narrated by: Edward Bauer
- Length: 6 hrs and 31 mins
- Unabridged
-
Overall
-
Performance
-
Story
Team Topologies is a practical, step-by-step, adaptive model for organizational design and team interaction based on four fundamental team types and three team interaction patterns. It is a model that treats teams as the fundamental means of delivery, where team structures and communication pathways are able to evolve with technological and organizational maturity. In Team Topologies, IT consultants Matthew Skelton and Manuel Pais share secrets of successful team patterns and interactions to help listeners choose and evolve the right team patterns for their organization.
-
-
Nice of you’re Amazon or Google
- By Johann D on 06-02-22
By: Matthew Skelton, and others
-
Project to Product: How to Survive and Thrive in the Age of Digital Disruption with the Flow Framework
- By: Mik Kersten
- Narrated by: Edward Bauer
- Length: 6 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project to Product, value stream network pioneer and technology business leader Dr. Mik Kersten introduces the Flow Framework - a new way of seeing, measuring, and managing software delivery. The Flow Framework will enable your company's evolution from project-oriented dinosaur to product-centric innovator that thrives in the age of software. If you're driving your organization's transformation at any level, this is the audiobook for you.
-
-
Great book but missing the additional PDF material
- By Sigurborg Rögnvaldsdóttir on 12-01-18
By: Mik Kersten
-
Digital Transformation
- Survive and Thrive in an Era of Mass Extinction
- By: Thomas M. Siebel
- Narrated by: Thomas M. Siebel
- Length: 9 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The confluence of four technologies - elastic cloud computing, big data, artificial intelligence, and the internet of things - writes Siebel, is fundamentally changing how business and government will operate in the 21st century. Siebel masterfully guides listeners through a fascinating discussion of the game-changing technologies driving digital transformation and provides a roadmap to seize them as a strategic opportunity.
-
-
The bible for your Digital Transformation projects
- By GR7381 on 07-19-19
By: Thomas M. Siebel
-
Essential CISA Exam Guide: Updated for the 26th Edition
- By: Phil Martin
- Narrated by: Phil Martin
- Length: 22 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Essential CISA has been made with a single goal in mind - to present the CISA material in a way that is easy to absorb without leaving any content behind. Plenty of examples are included to drive the points home so when it comes time to take the CISA exam, you are ready!
-
-
Good material, besides being the currently only
- By Ariel on 12-22-19
By: Phil Martin