Similar authors to follow
Manage your follows
About Sherri Davidoff
Sherri Davidoff is the CEO of LMG Security. As a recognized expert in digital forensics and cybersecurity, Sherri has been called a “security badass” by the New York Times.
Sherri has conducted cybersecurity training for many distinguished organizations, including
the FDIC/FFIEC, the American Bar Association, the Department of Defense, and many more.
She is a faculty member at the Pacific Coast Banking School, and an instructor for Black Hat,
where she teaches her “Data Breaches” course. She is also the coauthor of Network Forensics:
Tracking Hackers Through Cyberspace (Prentice Hall, 2012), a noted security text in the private
sector and a college textbook for many cybersecurity courses.
Sherri is a GIAC-certified forensic examiner (GCFA) and penetration tester (GPEN), and
holds her degree in Computer Science and Electrical Engineering from MIT. She has also been
featured as the protagonist in Breaking and Entering: The Extraordinary Story of a Hacker
Customers Also Bought Items By
– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.
“It’s like a symphony meeting an encyclopedia meeting a spy novel.”
–Michael Ford, Corero Network Security
On the Internet, every action leaves a mark–in routers, firewalls, web proxies, and within network traffic itself. When a hacker breaks into a bank, or an insider smuggles secrets to a competitor, evidence of the crime is always left behind.
Learn to recognize hackers’ tracks and uncover network-based evidence in Network Forensics: Tracking Hackers through Cyberspace.Carve suspicious email attachments from packet captures. Use flow records to track an intruder as he pivots through the network. Analyze a real-world wireless encryption-cracking attack (and then crack the key yourself). Reconstruct a suspect’s web surfing history–and cached web pages, too–from a web proxy. Uncover DNS-tunneled traffic. Dissect the Operation Aurora exploit, caught on the wire.
Throughout the text, step-by-step case studies guide you through the analysis of network-based evidence. You can download the evidence files from the authors’ web site (lmgsecurity.com), and follow along to gain hands-on experience.
Hackers leave footprints all across the Internet. Can you find their tracks and solve the case? Pick up Network Forensicsand find out.
Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world’s most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control.
You’ll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism, ransomware, and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches.
- Understand what you need to know about data breaches, the dark web, and markets for stolen data
- Limit damage by going beyond conventional incident response
- Navigate high-risk payment card breaches in the context of PCI DSS
- Assess and mitigate data breach risks associated with vendors and third-party suppliers
- Manage compliance requirements associated with healthcare and HIPAA
- Quickly respond to ransomware and data exposure cases
- Make better decisions about cyber insurance and maximize the value of your policy
- Reduce cloud risks and properly prepare for cloud-based data breaches
Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.