- Books

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats


"Risks have evolved. We haven't. While we stabilize toward checkbox compliance, adversaries and IT accelerate onward. Adversaries know you're compliant - and do not care - they're counting on it. Let's replace faith-based dogma with intellectual honesty. As fellow Cassandras, Will and John confront you with modern threat models and challenge you to adapt". -Joshua Corman, Research Director for Enterprise Security, The 451 Group "During 2010 three specific names signaled a fundamental shift in the risks that come from dealing in an interconnected world: , Stuxnet, and Wikileaks. This book provides the insights of an intelligence analyst on what got us to this point, and forecasts what will be dealing with in the near future". -James Turner, Advisor, IBRS "Cybercrime and Espionage was probably the most comprehensive and relevant book on the cyber security landscape written to date. The authors captured the true essence of the methods and cyber trade craft backed with use case after use case. I find this book a must have for any security professional or executive that has the responsibility for ensuring the protection of their corporate infrastructure." - VP & GM Security Products Group/TippingPoint

Product Description

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed "Subversive Multi-Vector Threats" or 'SMT's. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace.
Includes detailed analysis and examples of the threats in addition to related anecdotal information
Author's combined backgrounds of security, military, and intelligence, give you distinct and timely insights
Present never before published information: identification and analysis of cybercrime and the psychological profiles that accompany them

About the Author

As former United States Marine, Mr.Gragido began his career in the data communications information security and intelligence space. Mr.Gragido is a seasoned information security and risk management professional with over 15 year's professional industry experience and brings a wealth of knowledge and experience to bear. Working in a variety of roles, Will has deep expertise and knowledge in operations, analysis, management, professional services & consultancy, pre-sales / architecture and business development within the information security industry. Will is a long-standing member of the ISC2, ISACA, and ISSA. Mr.Gragido holds the CISSP and CISA certifications, as well as accreditations in the National Security Agency's Information Security Assessment Methodology (IAM) and Information Security Evaluation Methodology (IEM).John has more than 10+ years of hands on security experience in security research, worldwide product management/development, security IV&V testing, forensics, and architecting/deploying enterprise wide security solutions for both public and private organizations worldwide. John has worked for the Central Intelligence Agency, Computer Systems Group LTD, Cisco Systems, IBM and McAfee. In addition to a BBA in Information Systems from the University of Texas, John also holds the NSA Information Assurance Methodology and Certified Ethical Hacker certifications. John was recently named security thought leader from SANS Institute and advisory board member of SANS Execubytes publication.

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats Book Reviews

No advertising and No spamming please.

Related Books

  • Visible Ops Security: Achieving Common Security and IT Operations Objectives in 4 Practical Steps ISO/IEC 27002 Foundation Complete Certification Kit - Study Guide Book and Online Course
  • Prometric Online Testing Certification Voucher Printed Access Card for EC-Council's Network Defense: Fundamentals and Protocols Official (ISC)2 Guide to the CISSP CBK, Second Edition ((ISC)2 Press)
  • The Privacy Papers: Managing Technology, Consumer, Employee and Legislative Actions Virtualization Security: Business Continuity (Ec-Council Disaster Recovery Professional (Edrp))
  • Cisco Network Admission Control, Volume II: NAC Deployment and Troubleshooting TippingPoint (Company Advisor)
  • Harboring Data: Information Security, Law, and the Corporation (Stanford Law Books) Official (ISC)2 Guide to the CISSP CBK, Second Edition
  • HP ASE Network Infrastructure Official Exam Certification Guide (Exam HP0-Y43) HP ASE Network Infrastructure Official Exam Certification Guide (Exam HP0-Y43)