
Cyber War...and Peace
Building Digital Trust Today with History as Our Guide
Failed to add items
Add to Cart failed.
Add to Wish List failed.
Remove from wishlist failed.
Adding to library failed
Follow podcast failed
Unfollow podcast failed

Get 2 free audiobooks during trial.
Buy for $15.59
No default payment method selected.
We are sorry. We are not allowed to sell this product with the selected payment method
-
Narrated by:
-
Michael Cummings
About this listen
"When evil men plot, good men must plan." (Martin Luther King, Jr.)
If anything is guaranteed about the future, it’s that technological innovation will advance more quickly each year. But progress isn’t just for those with good intentions. The technology that empowers you can also imperil you, making digital risk management an existential priority for your company.
Some of our most famous predecessors also faced unprecedented obstacles, and their stories are more than good folklore — they provide us with principles that transcend time and space.
In Cyber War…and Peace, Nick Shevelyov shares how lessons learned from history’s most poignant moments reveal strategies to help manage risk in today’s — and tomorrow’s — digital landscape. Nick’s insight and analysis will introduce you to concepts that will increase resiliency within your organization, no matter its size. This exploration of history, strategy, and the digital world around us will challenge you to reexamine the past, solve new problems, and embrace timeless techniques.
©2021 Nicholas Shevelyov (P)2021 Nicholas ShevelyovListeners also enjoyed...
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- By: Perry Carpenter, Kai Roer
- Narrated by: Perry Carpenter
- Length: 6 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
All common sense
- By Amazon Customer on 11-28-24
By: Perry Carpenter, and others
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- By Gilan on 01-31-25
By: Matthew K. Sharp, and others
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
A Leader’s Guide to Cybersecurity
- Why Boards Need to Lead - and How to Do It
- By: Thomas J. Parenty, Jack J. Domet
- Narrated by: Jonathan Todd Ross
- Length: 5 hrs and 47 mins
- Unabridged
-
Overall
-
Performance
-
Story
In A Leader's Guide to Cybersecurity, Thomas Parenty and Jack Domet, who've spent over three decades in the field, present a timely, clear-eyed, and actionable framework that will empower senior executives and board members to become stewards of their companies' cybersecurity activities. Filled with tools, best practices, and strategies, A Leader's Guide to Cybersecurity will help boards navigate this seemingly daunting but extremely necessary transition.
-
-
Must read for today’s corporate leaders
- By J. M. Wilson on 10-20-20
By: Thomas J. Parenty, and others
-
The Security Culture Playbook
- An Executive Guide to Reducing Risk and Developing Your Human Defense Layer
- By: Perry Carpenter, Kai Roer
- Narrated by: Perry Carpenter
- Length: 6 hrs and 55 mins
- Unabridged
-
Overall
-
Performance
-
Story
The topic of security culture is mysterious and confusing to most leaders. But it doesn't have to be. In The Security Culture Playbook, Perry Carpenter and Kai Roer deliver experience-driven, actionable insights into how to transform your organization's security culture and reduce human risk at every level. This book exposes the gaps in how organizations have traditionally approached human risk, and it provides security and business executives with the necessary information and tools needed to understand, measure, and improve facets of security culture across the organization.
-
-
All common sense
- By Amazon Customer on 11-28-24
By: Perry Carpenter, and others
-
The CISO Evolution
- Business Knowledge for Cybersecurity Executives
- By: Matthew K. Sharp, Kyriakos Lambros
- Narrated by: Christopher Grove
- Length: 13 hrs and 7 mins
- Unabridged
-
Overall
-
Performance
-
Story
In The CISO Evolution: Business Knowledge for Cybersecurity Executives, information security experts Matthew K. Sharp and Kyriakos "Rock" Lambros deliver an insightful and practical resource to help cybersecurity professionals develop the skills they need to effectively communicate with senior management and boards. They assert business aligned cybersecurity is crucial and demonstrate how business acumen is being put into action to deliver meaningful business outcomes.
-
-
Essential read for CISO’s and those in their professional orbit
- By Gilan on 01-31-25
By: Matthew K. Sharp, and others
-
The Phoenix Project
- A Novel about IT, DevOps, and Helping Your Business Win 5th Anniversary Edition
- By: Gene Kim, Kevin Behr, George Spafford
- Narrated by: Chris Ruen
- Length: 14 hrs and 46 mins
- Unabridged
-
Overall
-
Performance
-
Story
Bill, an IT manager at Parts Unlimited, has been tasked with taking on a project critical to the future of the business, code named Phoenix Project. But the project is massively over budget and behind schedule. The CEO demands Bill must fix the mess in 90 days, or else Bill’s entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of the Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined.
-
-
Theory and Practice merged
- By Peter on 11-23-15
By: Gene Kim, and others
-
Cybersecurity First Principles
- A Reboot of Strategy and Tactics
- By: Rick Howard
- Narrated by: Rick Howard
- Length: 9 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Rick Howard, the Chief Security Officer, Chief Analyst, and Senior fellow at The Cyberwire, challenges the conventional wisdom of current cybersecurity best practices, strategy, and tactics and makes the case that the profession needs to get back to first principles.
-
-
Just What I was looking for
- By Roman on 11-17-24
By: Rick Howard
-
Sandworm
- A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
- By: Andy Greenberg
- Narrated by: Mark Bramhall
- Length: 12 hrs and 2 mins
- Unabridged
-
Overall
-
Performance
-
Story
In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark.
-
-
Thru the eyes of the Sandworm's hunters and prey
- By ndru1 on 11-12-19
By: Andy Greenberg
-
1% Leadership
- Master the Small, Daily Improvements That Set Great Leaders Apart
- By: Andy Ellis
- Narrated by: Andy Ellis
- Length: 5 hrs and 17 mins
- Unabridged
-
Overall
-
Performance
-
Story
Leadership development speaker & consultant Andy Ellis is the former CSO of Akamai, where he contributed to the creation of Akamai's billion‑dollar cybersecurity business. He now brings his speaking, consulting, and business knowledge to listeners with 1% Leadership—based on the reality that real-world leadership is messy and complicated; it rarely fits into an acronym or a dogmatic overarching philosophy. Ellis says that there are no “irrefutable laws” of leadership or power; there is no secret.
-
-
Actionable Advice!
- By Matt Meis on 09-18-24
By: Andy Ellis
-
Good to Great
- Why Some Companies Make the Leap...And Others Don't
- By: Jim Collins
- Narrated by: Jim Collins
- Length: 10 hrs and 1 min
- Unabridged
-
Overall
-
Performance
-
Story
Built To Last, the defining management study of the 90s, showed how great companies triumph over time and how long-term sustained performance can be engineered into the DNA of an enterprise from the very beginning. But what about companies that are not born with great DNA? How can good companies, mediocre companies, even bad companies achieve enduring greatness?
-
-
Good info, over-the-top narration
- By Anaxamaxan on 08-31-10
By: Jim Collins
-
Artificial Intelligence
- Bliss or Peril for Future Humanity?: Understanding the Basics of AI in Our Everyday Lives
- By: Will Davis
- Narrated by: Lee Goettl
- Length: 3 hrs and 20 mins
- Unabridged
-
Overall
-
Performance
-
Story
Embark on a compelling exploration into the world of AI, where future reality meets boundless possibility. Can you afford to remain in the dark? When you watch a movie suggested by Netflix's AI, talk to your favorite brand's chatbot, or follow your car's navigation to the new restaurant in town, you interact with AI. Most people are spectators rather than actors in this fast-evolving digital epoch. This is where the insightful journey author Will Davis guides you on will change your perspective.
-
-
Good basic information for people like me that do not have the knowledge
- By Mena on 02-08-25
By: Will Davis
-
The Perfect Weapon
- War, Sabotage, and Fear in the Cyber Age
- By: David E. Sanger
- Narrated by: Robertson Dean
- Length: 12 hrs and 53 mins
- Unabridged
-
Overall
-
Performance
-
Story
The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes, cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents - Bush and Obama - drew first blood with Operation Olympic Games, which used malicious code to blow up Iran’s nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal.
-
-
mix of information and propaganda
- By Inthego on 06-14-19
By: David E. Sanger
-
Eleventh Hour CISSP®
- Study Guide, Third Edition
- By: Eric Conrad, Seth Misenar, Joshua Feldman
- Narrated by: Matthew E. Kelly
- Length: 10 hrs and 4 mins
- Unabridged
-
Overall
-
Performance
-
Story
Eleventh Hour CISSP®: Study Guide, Third Edition, provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. This new edition is aligned to cover all material in the most current version of the exam’s Common Body of Knowledge.
-
-
pretty good but need pdf file for charts
- By Amazon Customer on 08-24-21
By: Eric Conrad, and others
-
Good Strategy/Bad Strategy
- The Difference and Why It Matters
- By: Richard Rumelt
- Narrated by: Sean Runnette
- Length: 11 hrs and 49 mins
- Unabridged
-
Overall
-
Performance
-
Story
Developing and implementing a strategy is the central task of a leader. A good strategy is a specific and coherent response to - and approach for - overcoming the obstacles to progress. A good strategy works by harnessing and applying power where it will have the greatest effect. Yet, Rumelt shows that there has been a growing and unfortunate tendency to equate Mom-and-apple-pie values, fluffy packages of buzzwords, motivational slogans, and financial goals with “strategy”.
-
-
Good but thin
- By G. London on 01-04-20
By: Richard Rumelt
-
We Are All Targets
- How Renegade Hackers Invented Cyber War and Unleashed an Age of Global Chaos
- By: Matt Potter
- Narrated by: Matthew Waterson
- Length: 10 hrs and 15 mins
- Unabridged
-
Overall
-
Performance
-
Story
Two years before 9/11, the United States was attacked by an unknown enemy. No advance warning was given, and it didn't target civilians. Instead, tomahawk missiles started missing their targets, US agents were swept up by hostile governments, and America’s enemies seemed to know its every move in advance. A new phase of warfare—cyber war—had arrived. And within two decades it escaped Pandora's Box, plunging us into a state of total war where every day, countless cyber attacks perpetrated by states and mercenaries are reshaping the world.
-
-
Chilling
- By Mark Ingram on 02-06-25
By: Matt Potter
-
The Long Game
- How to Be a Long-Term Thinker in a Short-Term World
- By: Dorie Clark
- Narrated by: Dorie Clark
- Length: 5 hrs and 23 mins
- Unabridged
-
Overall
-
Performance
-
Story
It's no secret that we're pushed to the limit. Today's professionals feel rushed, overwhelmed, and perennially behind. How can we break out of the cycle and create the kind of interesting, meaningful lives that we all seek? Just as CEOs who optimize for quarterly profits often fail to make the strategic investments necessary for long-term growth, the same is true in our own personal and professional lives.
-
-
Worse version of a book that’s already been written
- By Chris B on 12-31-21
By: Dorie Clark
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- By: Chris Moschovitis
- Narrated by: Sean Pratt
- Length: 9 hrs and 9 mins
- Unabridged
-
Overall
-
Performance
-
Story
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Best Reference for Cyber Program Development
- By Roger Swanson on 07-19-18
-
Project Zero Trust
- A Story About a Strategy for Aligning Security and the Business
- By: George Finney, John Kindervag - foreword
- Narrated by: Daniel Thomas May
- Length: 7 hrs and 51 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Project Zero Trust: A Story About a Strategy for Aligning Security and the Business, George Finney, chief security officer at Southern Methodist University, delivers an insightful and practical discussion of Zero Trust implementation. Presented in the form of a fictional narrative involving a breach at a company, the book tracks the actions of the company's new IT security director. Listeners will learn John Kindervag's 5-Step methodology for implementing Zero Trust, the four Zero Trust design principles, and how to limit the impact of a breach.
-
-
This one will be a classic
- By Jordan on 10-16-22
By: George Finney, and others
-
Cybersecurity and Cyberwar
- What Everyone Needs to Know
- By: P. W. Singer, Allan Friedman
- Narrated by: Sean Pratt
- Length: 11 hrs and 29 mins
- Unabridged
-
Overall
-
Performance
-
Story
In Cybersecurity and Cyberwar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyberexpert Allan Friedman team up to provide the kind of deeply informative resource book that has been missing on a crucial issue of 21st-century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters....
-
-
A job application for some government job?
- By Pascal on 03-04-17
By: P. W. Singer, and others
-
The Fifth Domain
- Defending Our Country, Our Companies, and Ourselves in the Age of Cyber Threats
- By: Richard A. Clarke, Robert K. Knake
- Narrated by: Marc Cashman
- Length: 12 hrs and 8 mins
- Unabridged
-
Overall
-
Performance
-
Story
Clarke and Knake take us inside quantum-computing labs racing to develop cyber superweapons; bring us into the boardrooms of the many firms that have been hacked and the few that have not; and walk us through the corridors of the US intelligence community with officials working to defend America's elections from foreign malice. With a focus on solutions over scaremongering, they make a compelling case for "cyber resilience" - building systems that can resist most attacks, raising the costs on cyber criminals and the autocrats who often lurk behind them, and avoiding...overreaction.
-
-
The Author Lacks Critical Thinking
- By Thomas Rose on 08-08-20
By: Richard A. Clarke, and others