Listen free for 30 days

Listen with offer

Preview
  • You'll See This Message When It Is Too Late

  • The Legal and Economic Aftermath of Cybersecurity Breaches
  • By: Josephine Wolff
  • Narrated by: Kate Reading
  • Length: 14 hrs
  • 4.1 out of 5 stars (14 ratings)

£0.00 for first 30 days

Pick 1 audiobook a month from our unmatched collection - including bestsellers and new releases.
Listen all you want to thousands of included audiobooks, Originals, celeb exclusives, and podcasts.
Access exclusive sales and deals.
£7.99/month after 30 days. Renews automatically. See here for eligibility.

You'll See This Message When It Is Too Late

By: Josephine Wolff
Narrated by: Kate Reading
Try for £0.00

£7.99/month after 30 days. Renews automatically. See here for eligibility.

Buy Now for £20.99

Buy Now for £20.99

Pay using card ending in
By completing your purchase, you agree to Audible's Conditions of Use and authorise Audible to charge your designated card or any other card on file. Please see our Privacy Notice, Cookies Notice and Interest-based Ads Notice.

Summary

Cybersecurity incidents make the news with startling regularity. Each breach - the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump - makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that.

In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.

Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks - financial gain, espionage, and public humiliation of the victims - that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns.

The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at US-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

©2018 Josephine Wolff (P)2018 Blackstone Audio, Inc.
activate_Holiday_promo_in_buybox_DT_T2

Listeners also enjoyed...

Navigating New Cyber Risks cover art
Cybersecurity cover art
Cyber Security cover art
Cyber Essentials cover art
Introduction to Cyber Security: Fundamentals cover art
Fire Doesn't Innovate cover art
Obfuscation cover art
Ransomware Protection Playbook cover art
Listening In cover art
Hacking with Kali Linux cover art
A Vulnerable System cover art
Cybersecurity cover art
Cybersecurity cover art
Zero Trust and Third-Party Risk cover art
We Have Root cover art
Digital Resilience cover art

What listeners say about You'll See This Message When It Is Too Late

Average customer ratings
Overall
  • 4 out of 5 stars
  • 5 Stars
    7
  • 4 Stars
    3
  • 3 Stars
    3
  • 2 Stars
    1
  • 1 Stars
    0
Performance
  • 4 out of 5 stars
  • 5 Stars
    7
  • 4 Stars
    2
  • 3 Stars
    4
  • 2 Stars
    0
  • 1 Stars
    0
Story
  • 4 out of 5 stars
  • 5 Stars
    6
  • 4 Stars
    3
  • 3 Stars
    3
  • 2 Stars
    1
  • 1 Stars
    0

Reviews - Please select the tabs below to change the source of reviews.

Sort by:
Filter by:
  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

The title says it all

A good, informative book that everyone should read /hear both for info sec management and general interest.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

  • Overall
    5 out of 5 stars
  • Performance
    5 out of 5 stars
  • Story
    5 out of 5 stars

Surprisingly good despite the title

Using detailed case studies this audio book is an analysis of the dynamics of data breaches, defender VS attacker, collective action by stakeholders VS independent entities acting in self interest. Questions of liability in the wake of data breaches are answered through the lens of the case studies.

**Ignore the title** of this audio book and buy it anyway.

Notwithstanding the silly sensationalist title of this book which doesn't match the high quality of the content, this is a sober analysis that answers the questions it poses.
I like the fact this book doesn't suffer a victim complex .... so many books complaining not everyone is doing it right and if only they could have read their book the world would be wonderful... So many authors of business books seem to think if we aren't being constantly told this book will solve world hunger then we won't buy the book.
The title must have been written by someone other than the author because clearly it tries to be sensationalist, whereas the author thankfully is clearly rational and knowledgeable.

Message to the author: thanks for writing this, found it interesting and helpful, however next time make sure you have the rights to name the title

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!

2 people found this helpful

  • Overall
    2 out of 5 stars
  • Performance
    3 out of 5 stars
  • Story
    2 out of 5 stars

There's two books here...

One is a story of the biggest data breaches of recent times, and if that had been the largest theme of the book, it would have been exciting, compelling, technically challenging, and overall a triumph of nerdy tales of misadventure.

Unfortunately, the main thrust of this book is not the breaches themselves (though they are covered in detail), it's the twin themes of (1) the aftermath of the breaches - which would certainly have been a necessary postscript to each chapter; (2) who was to blame for each breach in the sense of not taking the necessary security precautions, and - a point hammered home ruthlessly and repetitively - how effective are those security precautions in isolation when faced with determined attackers? As such, the book might appeal in a doctrinaire way to companies that have been the subject of breaches, their IT managers and departments, and people responsible for the allocation of budgets especially in relation to the economics of instituting policies as opposed to the possible costs to a company of a breach. But this made the book rather dry and boring, once the account of the breach in question had been outlined.

If you're an IT manager for a company, this might be a good textbook for you. If you're an ordinary reader with some knowledge of computing, the in-depth post-breach analysis is wearisome.

Something went wrong. Please try again in a few minutes.

You voted on this review!

You reported this review!