Cyber Mayday and the Day After
A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed
Get 2 free audiobooks during trial.
Buy for $17.19
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Chris Reilly
About this listen
Digital transformation and cyber insecurity are two global trends that converged in 2020. The COVID-19 pandemic has accelerated these global challenges into paradigm-changing realities that threaten to destroy every company, government, network, and individual. But what can be done to embrace the accelerating digital disruption and at the same time manage the explosion of vulnerabilities, cyber threats, and business risks? What strategies are enabling technology leaders to thrive in this fast-changing landscape and stay calm in the midst of a world filled with ransomware, online deception, and nation-state hackers?
Cyber Mayday and the Day After is a business book, a communication toolkit offering stories, strategies, tactics, and outlook with key extracts and lessons learned from top C-executive leaders around the world. Some of these insights come from former FBIs, NASA agents, government CISOs, and high-profile CxOs, offering practical examples and workable solutions for leaders to succeed in the 21st century. This book unpacks key learnings on leadership and influence. It equips listeners with the mastery of their stakeholders and explores how to effect a cultural change within organizations.
©2022 John Wiley & Sons, Inc. (P)2021 Ascent AudioListeners also enjoyed...
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
Battlefield Cyber
- How China and Russia Are Undermining Our Democracy and National Security
- By: Michael G. McLaughlin, William Holstein
- Narrated by: Steve Menasche
- Length: 11 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response.
-
-
Lack case studies on Russian threats and attacks.
- By MommyCEO on 03-14-24
By: Michael G. McLaughlin, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- By: Christian Brose
- Narrated by: Christian Brose
- Length: 9 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network"—the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- By Tomas Singliar on 06-06-20
By: Christian Brose
-
Soundtracks
- The Surprising Solution to Overthinking
- By: Jon Acuff
- Narrated by: Jon Acuff
- Length: 5 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
Overthinking isn't a personality trait. It's the sneakiest form of fear. It steals time, creativity, and goals. It's the most expensive, least productive thing companies invest in without even knowing it. And it's an epidemic. When New York Times best-selling author Jon Acuff changed his life by transforming his overthinking, he wondered if other people might benefit from what he discovered. He commissioned a research study to ask 10,000 people if they struggle with overthinking too, and 99.5 percent said, "Yes!"
-
-
Overthinking: Superpower > Superproblem
- By Marshall Coleman on 04-28-21
By: Jon Acuff
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
Battlefield Cyber
- How China and Russia Are Undermining Our Democracy and National Security
- By: Michael G. McLaughlin, William Holstein
- Narrated by: Steve Menasche
- Length: 11 hrs and 59 mins
- Unabridged
-
Overall
-
Performance
-
Story
The United States is being bombarded with cyber-attacks. From the surge in ransomware groups targeting critical infrastructure to nation states compromising the software supply chain and corporate email servers, malicious cyber activities have reached an all-time high. Russia attracts the most attention, but China is vastly more sophisticated. They have a common interest in exploiting the openness of the Internet and social media—and our democracy—to erode confidence in our institutions and to exacerbate our societal rifts to prevent us from mounting an effective response.
-
-
Lack case studies on Russian threats and attacks.
- By MommyCEO on 03-14-24
By: Michael G. McLaughlin, and others
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
The Kill Chain
- Defending America in the Future of High-Tech Warfare
- By: Christian Brose
- Narrated by: Christian Brose
- Length: 9 hrs and 44 mins
- Unabridged
-
Overall
-
Performance
-
Story
When we think about the future of war, the military and Washington and most everyone gets it backwards. We think in terms of buying single military systems, such as fighter jets or aircraft carriers. And when we think about modernizing those systems, we think about buying better versions of the same things. But what really matters is not the single system but "the battle network"—the collection of sensors and shooters that enables a military to find an enemy system, target it, and attack it.
-
-
important message but repetitive
- By Tomas Singliar on 06-06-20
By: Christian Brose
-
Soundtracks
- The Surprising Solution to Overthinking
- By: Jon Acuff
- Narrated by: Jon Acuff
- Length: 5 hrs and 14 mins
- Unabridged
-
Overall
-
Performance
-
Story
Overthinking isn't a personality trait. It's the sneakiest form of fear. It steals time, creativity, and goals. It's the most expensive, least productive thing companies invest in without even knowing it. And it's an epidemic. When New York Times best-selling author Jon Acuff changed his life by transforming his overthinking, he wondered if other people might benefit from what he discovered. He commissioned a research study to ask 10,000 people if they struggle with overthinking too, and 99.5 percent said, "Yes!"
-
-
Overthinking: Superpower > Superproblem
- By Marshall Coleman on 04-28-21
By: Jon Acuff
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Recommend
- By Cristen Mini on 01-15-24
By: Matthew K. Sharp, and others
-
The Art of Attack
- Attacker Mindset for Security Professionals
- By: Maxie Reynolds
- Narrated by: Stephanie Dillard
- Length: 9 hrs and 50 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Art of Attack: Attacker Mindset for Security Professionals, Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to and how to use it to their advantage.
-
-
A Chess game to win
- By Anonymous User on 10-19-22
By: Maxie Reynolds
-
Tracers in the Dark
- The Global Hunt for the Crime Lords of Cryptocurrency
- By: Andy Greenberg
- Narrated by: Ari Fliakos
- Length: 10 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Over the last decade, a single innovation has massively fueled digital black markets: cryptocurrency. Crime lords inhabiting lawless corners of the internet have operated more freely—whether in drug dealing, money laundering, or human trafficking—than their analog counterparts could have ever dreamed of. By transacting not in dollars or pounds but in currencies with anonymous ledgers, overseen by no government, beholden to no bankers, these black marketeers have sought to rob law enforcement of their chief method of cracking down on illicit finance: following the money.
-
-
Could not put this down
- By Mike Reaves on 01-28-23
By: Andy Greenberg
-
Fancy Bear Goes Phishing
- The Dark History of the Information Age, in Five Extraordinary Hacks
- By: Scott J. Shapiro
- Narrated by: Jonathan Todd Ross
- Length: 15 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
It’s a signal paradox of our times that we live in an information society but do not know how it works. And without understanding how our information is stored, used, and protected, we are vulnerable to having it exploited. In Fancy Bear Goes Phishing, Scott J. Shapiro draws on his popular Yale University class about hacking to expose the secrets of the digital age. With lucidity and wit, he establishes that cybercrime has less to do with defective programming than with the faulty wiring of our psyches and society.
-
-
I can't seem to like this book...
- By Ken Vanden branden on 07-23-23
By: Scott J. Shapiro
-
Nonprofit Board Success
- How to Build a Board of Directors So Good That Even the Top CEOs Would Be Jealous
- By: James Ruell
- Narrated by: Robert Grindley
- Length: 4 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Written by James Ruell, who has served as director and vice-treasurer of an award-winning charity, Nonprofit Board Success gives practical advice and proven techniques for building a top-notch board of directors—one that will make you the envy of CEOs everywhere.
-
-
Just what I was looking for
- By Jeremy B on 12-11-23
By: James Ruell
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Recoding America
- Why Government Is Failing in the Digital Age and How We Can Do Better
- By: Jennifer Pahlka
- Narrated by: Jennifer Pahlka
- Length: 9 hrs and 37 mins
- Unabridged
-
Overall
-
Performance
-
Story
A bold call to reexamine how our government operates—and sometimes fails to—from President Obama’s former deputy chief technology officer and the founder of Code for America.
-
-
Very good, minimally partisan.
- By Samuel Mebane on 11-25-23
By: Jennifer Pahlka
-
The Big Nine
- How the Tech Titans and Their Thinking Machines Could Warp Humanity
- By: Amy Webb
- Narrated by: Amanda Dolan
- Length: 9 hrs and 35 mins
- Unabridged
-
Overall
-
Performance
-
Story
In this book, Amy Webb reveals the pervasive, invisible ways in which the foundations of AI - the people working on the system, their motivations, the technology itself - is broken. Within our lifetimes, AI will, by design, begin to behave unpredictably, thinking and acting in ways which defy human logic. The big nine corporations may be inadvertently building and enabling vast arrays of intelligent systems that don't share our motivations, desires, or hopes for the future of humanity.
-
-
Interesting but Frustrating
- By Kathy on 03-26-19
By: Amy Webb
-
Cybersecurity Leadership
- Powering the Modern Organization
- By: Mansur Hasib
- Narrated by: Mansur Hasib
- Length: 7 hrs and 3 mins
- Unabridged
-
Overall
-
Performance
-
Story
Cybersecurity involves people, policy, and technology. Yet most books and academic programs cover only technology. Hence the implementation of cybersecurity as a people powered perpetual innovation and productivity engine is not done. People think they can buy cybersecurity as a product when in fact the discipline is the modern practice of digital business strategy. People also equate cybersecurity with information security or security alone. However, security is a state, while cybersecurity is a process.
-
-
CIOs and CISOs should read this book...
- By Chad L Fulgham on 08-12-15
By: Mansur Hasib
-
90 Days: A CISO’s Journey to Impact
- Define Your Role
- By: SentinelOne Publication, Migo Kedem - introduction
- Narrated by: SentinelOne
- Length: 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
In our first publication, 90 Days: A CISO’s Journey to Impact, we profile some of the world’s leading enterprise cybersecurity leaders. They share their views on the role and advice to create rapid impact in a reasonable amount of time - 90 days. It is our hope that listeners, whether existing or future CISOs, gain insights to continuously improve and be their most effective selves.
-
-
Audio Book is only about 30 minutes long
- By Brad on 06-10-23
By: SentinelOne Publication, and others
-
Prepare for the ISACA Certified Information Security Manager Exam
- CISM Review Manual
- By: Gwen Bettwy, Mark Williams, Mike Beevers
- Narrated by: Gwen Bettwy
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
A straightforward look at the four domains of the ISACA Certified Information Security Manager exam. This book will help you get a firm grasp on the key topics needed for success with the exam. Included are over 120 practice questions covering the four domains of ISACA's CISM.
-
-
Good content could be organized better
- By SMB on 09-21-21
By: Gwen Bettwy, and others
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Thomas Rose on 08-08-20
By: Richard A. Clarke, and others
Related to this topic
-
Red Team
- How to Succeed by Thinking Like the Enemy
- By: Micah Zenko
- Narrated by: Christopher Lane
- Length: 11 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Red teaming. It is a practice as old as the Devil's Advocate, the 11th-century Vatican official charged with discrediting candidates for sainthood. Today, red teams - comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors - are used widely in both the public and private sector.
-
-
Repetitive
- By Pax S Whitmore on 07-12-16
By: Micah Zenko
-
Attacker's Advantage
- Turning Uncertainty into Breakthrough Opportunities
- By: Ram Charan
- Narrated by: Mark Bramhall
- Length: 6 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Attacker's Advantage, Charan reveals the upside of uncertainty for those leaders who are nimbly positioned to anticipate the catalysts of disruption and embrace change. He updates and adapts the principles of his previous best sellers to address the current turbulent business environment, cutting through the veil of complexity to concentrate on the new customer needs and expectations and providing the tools for corporate leaders to take their companies to a higher level.
-
-
Fantastic book - volume lower than usual
- By James Gajewski on 06-14-15
By: Ram Charan
-
Driving Digital
- The Leader's Guide to Business Transformation Through Technology
- By: Isaac Sacolick
- Narrated by: Tom Parks
- Length: 10 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
The race is on to become a digital enterprise. Every organization has a plan for updating products, technologies, and business processes. But that's not enough anymore. With disruptive startups outperforming industry stalwarts, executives everywhere are pushing greater growth and innovation. Staying competitive demands a complete digital transformation.
-
-
Best book I have read on Digital Transformation
- By Holistic Health on 10-20-17
By: Isaac Sacolick
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
System Error
- Where Big Tech Went Wrong and How We Can Reboot
- By: Rob Reich, Mehran Sahami, Jeremy M. Weinstein
- Narrated by: Kaleo Griffith
- Length: 11 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In no more than the blink of an eye, a naïve optimism about technology’s liberating potential has given way to a dystopian obsession with biased algorithms, surveillance capitalism, and job-displacing robots. System Error exposes the root of our current predicament - how big tech’s relentless focus on optimization is driving a future that reinforces discrimination, erodes privacy, displaces workers, and pollutes the information we get- and outlines steps we can take to change course, renew our democracy, and save ourselves.
-
-
Excellent on tech. Weak on political speech.
- By Kindle Customer on 11-05-21
By: Rob Reich, and others
-
Think Like Amazon
- 50 1/2 Ideas to Become a Digital Leader
- By: John Rossman
- Narrated by: Jeff Cummings, John Rossman
- Length: 9 hrs and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
“What would Jeff do?” Since leaving Amazon to advise start-ups and corporations, John Rossman has been asked this question countless times by executives who want to know “the secret” behind Amazon’s historic success. In this step-by-step guide, he provides 50½ answers drawn from his experience as an Amazon executive - and shows today’s business leaders how to think like Amazon, strategize like Bezos, and beat the competition like nobody’s business.
-
-
A must read if you really want to innovate like Amazon
- By Npino on 05-19-19
By: John Rossman
-
Red Team
- How to Succeed by Thinking Like the Enemy
- By: Micah Zenko
- Narrated by: Christopher Lane
- Length: 11 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
Red teaming. It is a practice as old as the Devil's Advocate, the 11th-century Vatican official charged with discrediting candidates for sainthood. Today, red teams - comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors - are used widely in both the public and private sector.
-
-
Repetitive
- By Pax S Whitmore on 07-12-16
By: Micah Zenko
-
Attacker's Advantage
- Turning Uncertainty into Breakthrough Opportunities
- By: Ram Charan
- Narrated by: Mark Bramhall
- Length: 6 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The Attacker's Advantage, Charan reveals the upside of uncertainty for those leaders who are nimbly positioned to anticipate the catalysts of disruption and embrace change. He updates and adapts the principles of his previous best sellers to address the current turbulent business environment, cutting through the veil of complexity to concentrate on the new customer needs and expectations and providing the tools for corporate leaders to take their companies to a higher level.
-
-
Fantastic book - volume lower than usual
- By James Gajewski on 06-14-15
By: Ram Charan
-
Driving Digital
- The Leader's Guide to Business Transformation Through Technology
- By: Isaac Sacolick
- Narrated by: Tom Parks
- Length: 10 hrs and 13 mins
- Unabridged
-
Overall
-
Performance
-
Story
The race is on to become a digital enterprise. Every organization has a plan for updating products, technologies, and business processes. But that's not enough anymore. With disruptive startups outperforming industry stalwarts, executives everywhere are pushing greater growth and innovation. Staying competitive demands a complete digital transformation.
-
-
Best book I have read on Digital Transformation
- By Holistic Health on 10-20-17
By: Isaac Sacolick
-
The Hacker and the State
- Cyber Attacks and the New Normal of Geopolitics
- By: Ben Buchanan
- Narrated by: Christopher Grove
- Length: 11 hrs and 19 mins
- Unabridged
-
Overall
-
Performance
-
Story
Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance.
-
-
A good overview of hacking influence on government
- By Eric Jackson on 08-05-20
By: Ben Buchanan
-
System Error
- Where Big Tech Went Wrong and How We Can Reboot
- By: Rob Reich, Mehran Sahami, Jeremy M. Weinstein
- Narrated by: Kaleo Griffith
- Length: 11 hrs and 28 mins
- Unabridged
-
Overall
-
Performance
-
Story
In no more than the blink of an eye, a naïve optimism about technology’s liberating potential has given way to a dystopian obsession with biased algorithms, surveillance capitalism, and job-displacing robots. System Error exposes the root of our current predicament - how big tech’s relentless focus on optimization is driving a future that reinforces discrimination, erodes privacy, displaces workers, and pollutes the information we get- and outlines steps we can take to change course, renew our democracy, and save ourselves.
-
-
Excellent on tech. Weak on political speech.
- By Kindle Customer on 11-05-21
By: Rob Reich, and others
-
Think Like Amazon
- 50 1/2 Ideas to Become a Digital Leader
- By: John Rossman
- Narrated by: Jeff Cummings, John Rossman
- Length: 9 hrs and 10 mins
- Unabridged
-
Overall
-
Performance
-
Story
“What would Jeff do?” Since leaving Amazon to advise start-ups and corporations, John Rossman has been asked this question countless times by executives who want to know “the secret” behind Amazon’s historic success. In this step-by-step guide, he provides 50½ answers drawn from his experience as an Amazon executive - and shows today’s business leaders how to think like Amazon, strategize like Bezos, and beat the competition like nobody’s business.
-
-
A must read if you really want to innovate like Amazon
- By Npino on 05-19-19
By: John Rossman
-
The Digital Silk Road
- China's Quest to Wire the World and Win the Future
- By: Jonathan E. Hillman
- Narrated by: James Fouhey
- Length: 9 hrs and 58 mins
- Unabridged
-
Overall
-
Performance
-
Story
From the ocean floor to outer space, China’s Digital Silk Road aims to wire the world and rewrite the global order. Taking listeners on a journey inside China’s surveillance state, rural America, and Africa’s megacities, Jonathan Hillman reveals what China’s expanding digital footprint looks like on the ground and explores the economic and strategic consequences of a future in which all routers lead to Beijing.
-
-
THE RACE TO WIRE THE WORLD
- By jaga on 01-23-22
-
The Complete Guide to Mergers and Acquisitions
- Process Tools to Support M&A Integration at Every Level, 3rd Edition
- By: Timothy J. Galpin, Mark Herndon
- Narrated by: Paul Heitsch
- Length: 10 hrs and 39 mins
- Unabridged
-
Overall
-
Performance
-
Story
Merger and acquisition activity across the globe continues to grow, and is also playing a major role in the development of expanding markets. A well-managed integration effort is essential to success, and failure means a tremendous waste in terms of time and money, as well as the rapid destruction of shareholder value. The Complete Guide to Mergers and Acquisitions: Process Tools to Support M&A Integration at Every Level, Third Edition is an invaluable resource to guide firms in managing M&A integration and maximize the value of their deals.
-
-
Sales brochure for the authors
- By J Garner on 04-18-22
By: Timothy J. Galpin, and others
-
The Hacked World Order
- How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age
- By: Adam Segal
- Narrated by: Don Hagen
- Length: 10 hrs and 40 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Internet today connects roughly 2.7 billion people around the world, and booming interest in the "Internet of things" could result in 75 billion devices connected to the web by 2020. The myth of cyberspace as a digital utopia has long been put to rest. Governments are increasingly developing smarter ways of asserting their national authority in cyberspace in an effort to control the flow, organization, and ownership of information.
-
-
Wrong narrator for material
- By Locnar on 02-21-17
By: Adam Segal
-
Human + Machine
- Reimagining Work in the Age of AI
- By: Paul R. Daugherty, H. James Wilson
- Narrated by: Jamie Renell
- Length: 5 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
Look around you. Artificial intelligence is no longer just a futuristic notion. It's here right now - in software that senses what we need, supply chains that "think" in real time, and robots that respond to changes in their environment. Twenty-first-century pioneer companies are already using AI to innovate and grow fast. The bottom line is this: Businesses that understand how to harness AI can surge ahead. Those that neglect it will fall behind. Which side are you on?
-
-
A golf course book
- By C. Surdak on 07-30-18
By: Paul R. Daugherty, and others
-
Click Here to Kill Everybody
- Security and Survival in a Hyper-connected World
- By: Bruce Schneier
- Narrated by: Roger Wayne
- Length: 8 hrs and 6 mins
- Unabridged
-
Overall
-
Performance
-
Story
Everything is a computer. Ovens are computers that make things hot; refrigerators are computers that keep things cold. These computers - from home thermostats to chemical plants - are all online. All computers can be hacked. And Internet-connected computers are the most vulnerable. Forget data theft: Cutting-edge digital attackers can now crash your car, your pacemaker, and the nation’s power grid. In Click Here to Kill Everybody, renowned expert and best-selling author Bruce Schneier examines the hidden risks of this new reality.
-
-
Same old Bruce
- By Fausto Cepeda on 04-03-19
By: Bruce Schneier
-
Digital Transformation
- Survive and Thrive in an Era of Mass Extinction
- By: Thomas M. Siebel
- Narrated by: Thomas M. Siebel
- Length: 9 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
The confluence of four technologies - elastic cloud computing, big data, artificial intelligence, and the internet of things - writes Siebel, is fundamentally changing how business and government will operate in the 21st century. Siebel masterfully guides listeners through a fascinating discussion of the game-changing technologies driving digital transformation and provides a roadmap to seize them as a strategic opportunity.
-
-
The bible for your Digital Transformation projects
- By GR7381 on 07-19-19
By: Thomas M. Siebel