Chapter 10


Let’s think the unthinkable, let’s do the undoable. Let us prepare to grapple with the ineffable itself, and see if we may not eff it after all.

—Douglas Adams

Learning Objectives

  • Identify the keys to building an effective cybersecurity program

  • Describe key security technologies that can prevent initial entry

  • Learn techniques and strategies for catching cyberattackers early, before an incident metastasizes into cyber extortion

  • Know how to reduce attackers’ leverage by increasing your operational resilience and decreasing the risk of data theft

  • Understand that cyber extortion is a systemic challenge that requires a coordinated, global response

Extortion is the end of a journey; the last phase of a cyberattack. The adversaries’ ...

Get Ransomware and Cyber Extortion: Response and Prevention now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.