The DOD Cyber Strategy

Amazon Price: N/A (as of November 23, 2017 05:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

We live in a wired world. Companies and countries rely on cyberspace for everything from financial transactions to the movement of military forces. Computer code blurs the line between the cyber and physical world and connects millions of objects to the Internet or private networks. Electric firms rely on industrial control systems to provide power to the grid. Shipping managers use satellites and the Internet to track freighters as they pass through global sea lanes, and the U.S. military relies on secure networks and data to carry out its missions.

The United States is committed to an open, secure, interoperable, and reliable Internet that enables prosperity, public safety, and the free flow of commerce and ideas. These qualities of the Internet reflect core American values – of freedom of expression and privacy, creativity, opportunity, and innovation. And these qualities have allowed the Internet to provide social and economic value to billions of people. Within the U.S. economy alone, anywhere from three to 13 percent of business sector value-added is derived from Internet-related businesses. Over the last ten years Internet access increased by over two billion people across the globe.. Yet these same qualities of openness and dynamism that led to the Internet’s rapid expansion now provide dangerous state and non-state actors with a means to undermine U.S. interests. We are vulnerable in this wired world.

Pattern-Oriented Software Diagnostics, Debugging, Malware Analysis, Reversing: Sample Training Exercises (Software Diagnostics Services Training Courses)

Amazon Price: N/A (as of November 23, 2017 09:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Contains 9 exercises from various training courses and packs developed by Software Diagnostics Services (www.PatternDiagnostics.com) covering Windows WinDbg and Mac OS X GDB / LLDB debuggers and utilizing pattern-oriented methodology developed by Software Diagnostics Institute (DumpAnalysis.org + TraceAnalysis.org).

Wolves, Sheep and Sheepdogs: A Leader’s Guide to Information Security

Rating: 
Amazon Price: $14.95 $14.95 (as of November 23, 2017 18:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The angles of attack in today’s cyber security landscape evolve every moment. But even more ominous, there is no organization too small to escape being a target. However, there is an answer to these threats: a good sheepdog, alert to every danger and breach. In Wolves, Sheep and Sheepdogs: A Leader’s Guide to Information Security, authors Jim Shaeffer and John Cunningham use a powerful analogy to paint a vivid picture of both sides of the firewall. Whether you are a Board Member, investor, CEO or CISO you will gain a deeper understanding of the roles, characteristics, and motivations of both security professionals and the wolves they guard against. Shaeffer and Cunningham have worked with scores of organizations and share some of their keenest insight to achieving an adaptive security mindset. In doing so, they create a common language for those in both information security and non-technical leadership positions. No matter your role, this book will help give your organization a cyber-security edge against the threats of today and tomorrow.

Surviving the Rise of Cybercrime: A non-technical executive guide (Australia)

Amazon Price: N/A (as of November 23, 2017 17:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This guide aims to provide a non-technical insight into cybersecurity for time-poor executives who are new to the threats emerging in this space. In less than 60 minutes, I aim to provide you with an understanding of cybersecurity and what it means for your organisation, to highlight some real-world examples, and to make you familiar with some industry jargon
and terminology.
I’m Craig McDonald, CEO & Founder of MailGuard. A cloud-based email and web security business since 2001, MailGuard was recently commended as a “world-leading” innovator by the Australian Prime Minister, The Hon. Malcolm Turnbull MP.

Your key takeaways will be:
1) Identifying threats to your business
2) Finding out why cybercriminals are targeting your business and staff
3) Understanding why your IT team is struggling to prevent these threats
4) Knowing your role and responsibilities as a C-level executive or business leader, and
5) How to educate and empower your managers and teams as the frontline in your cyber-defence.
Continue reading “Surviving the Rise of Cybercrime: A non-technical executive guide (Australia)”

Cryptolocker Virus: Thieves Are After Your Business

Rating: 
Amazon Price: N/A (as of November 23, 2017 16:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Attention Business Owners, Executives, and Non-Technical Users: Cryptolocker Ransomware Guide For Safety is a book to help you learn about the Cryptolocker Ransomware virus and how it can take your business down and cost you serious money. Learn how you can keep it from ever affecting you and your business. This book is NOT written for the technical user that knows how to scour the Internet and Forums to find solutions. This book is a compilation of real-world experience along with accurate information on how to protect yourself. If you value your time and would like education on this serious threat, look no further.