$0.99/month for 3 months
$0.99$0.99
- Limited-Time Offer: Get Audible Premium Plus for $0.99 a month for the first 3 months.
- You'll receive 1 credit a month to pick ANY title from our entire premium selection to keep forever (you'll use your first credit now).
- You'll also get UNLIMITED listening to select audiobooks, Audible Originals, and podcasts.
- After 3 months, $14.95$14.95 /mo. Cancel online anytime.

Enjoy a free trial on us
$0.00$0.00
- One credit a month to pick any title from our entire premium selection to keep (you’ll use your first credit now).
- Unlimited listening on select audiobooks, Audible Originals, and podcasts.
- You will get an email reminder before your trial ends.
- $14.95$14.95 a month after 30 days. Cancel online anytime.
Buy
-13% $15.66$15.66
You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches
Audible Audiobook
– Unabridged
Cybersecurity incidents make the news with startling regularity. Each breach - the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump - makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that.
In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.
Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks - financial gain, espionage, and public humiliation of the victims - that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns.
The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at US-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.
- Listening Length14 hours
- Audible release dateNovember 13, 2018
- LanguageEnglish
- ASINB07K6STT1Y
- VersionUnabridged
- Program TypeAudiobook
Read & Listen
Get the Audible audiobook for the reduced price of $2.18 after you buy the Kindle book.
People who bought this also bought
- Audible Audiobook
- Audible Audiobook
- Audible Audiobook
- Audible Audiobook
- Audible Audiobook
Product details
Part of series | Information Policy |
---|---|
Listening Length | 14 hours |
Author | Josephine Wolff |
Narrator | Kate Reading |
Whispersync for Voice | Ready |
Audible.com Release Date | November 13, 2018 |
Publisher | Blackstone Audio, Inc. |
Program Type | Audiobook |
Version | Unabridged |
Language | English |
ASIN | B07K6STT1Y |
Best Sellers Rank | #294,591 in Audible Books & Originals (See Top 100 in Audible Books & Originals) #65 in Science & Technology Public Policy #138 in Computer & Internet Law #178 in Science & Technology Law (Books) |
Customer reviews
- 5 star4 star3 star2 star1 star5 star63%33%4%0%0%63%
- 5 star4 star3 star2 star1 star4 star63%33%4%0%0%33%
- 5 star4 star3 star2 star1 star3 star63%33%4%0%0%4%
- 5 star4 star3 star2 star1 star2 star63%33%4%0%0%0%
- 5 star4 star3 star2 star1 star1 star63%33%4%0%0%0%
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonTop reviews from the United States
There was a problem filtering reviews. Please reload the page.
- Reviewed in the United States on November 30, 2018Prof. Wolff has done an excellent job of explaining how current cybersecurity issues have as much to do with business, policy, and law as actual technology flaws. By focusing on six large cyber attacks, she helps both lay readers and IT professionals understand how conflicting interests and complexities in assessing liability and blame confound our efforts to keep the internet secure. After reading this book I changed all my passwords - again.
- Reviewed in the United States on May 26, 2019Disclosures: I do not know the author; I did buy the book from Amazon; I am not a robot. I thought this was a very intelligent analysis of the situation we are all in regarding cybersecurity. The first part of the book is a clear analysis of breaches in several domains: finance, espionage, and public humiliation. All of this information is already in the public domain, but not in one place. Very useful compilation of information. One missing sector: healthcare. The second part of the book discusses how we can prevent breaches. The author's perspective is to include the entire scope of the breach transaction, including converting stolen cards to cash and stolen trade secrets to increased product sales. Her view is that government policy makers need to play a more active role, since no one private actor has control over the breach chain, outside their own organization. Many will support this view, but we do not yet have the political will to make effective changes to policy. Such changes may happen incrementally. This second section is a very good analysis of the roles played by all participants in a security breach. I would give the book 5 stars on content, but found the text a little wordy, so reduced my review to 4 stars.
- Reviewed in the United States on December 22, 2018Most of the news coverage on data breaches is little more than a round of finger pointing and cries for the heads of the corporate executives involved. Professor Wolff provides a thoughtful and actionable analysis of breaches and what we can all do to mitigate them, whether as an IT professional, policy maker, or citizen.
- Reviewed in the United States on March 3, 2019This book is a must-read for anyone concerned about the future of data security - which should be all of us. Josephine does a great job of balancing information with fascinating storytelling. It's a very enjoyable read and such an important book for our time.
- Reviewed in the United States on January 16, 2023Who is this for?
The intended audience is likely cybersecurity professional, legislators, lawyers, and C-suite folks (particularly the CTO or CISO). This text tosses around technical jargon and acronyms like candy on Halloween. While the author does make an attempt to explain many concepts, it would be unreasonable for her to explain them all. If you don’t know the following terms, it may be a difficult read: IP addresses, certificate authority, botnet, endpoint protection, firewall/router/switches.
It’s unlikely this was intended for a broader audience, such as the average user of technology, which is a shame. It’s slightly too technical to be friendly to the average user. If you’re smarter than the average bear and are interested in some of the most serious breaches of our lifetime, then it might be worth giving it a try.
My Thoughts:
So, I’m a cybersecurity analyst, right? I’ve heard about many of these breaches already. In fact, of the 9 main incidents, I knew about 7 of them. Did that make this less useful to me? Probably not. The reason for that is the slant: the legislative and economic ramifications of breaches. My previous interaction with similar material was more on the technical front, not financial. It was good to see a bigger-picture on how and why things played out the way they did.
I’m glad I read (listened) to this, but I probably would not do it again, unless I had to write a term paper or something. It’s pretty dry. If you told me nothing about the author, I’d stake my next paycheck that it was written by a professor. It reads like a lecture. It’s just a ton of information and facts and details and all good stuff to know, but it’s just not…entertaining or relatable or even fun. Parts were kind of a drag, for instance, when the US government was breached, folks were just pointing fingers at each other, shifting blame around. I think the government needs a good lesson in leadership from Jocko on extreme ownership, but I digress.
The last section was terribly boring to me. I missed a good portion of it and didn’t much care to re-listen. My un-willingness to go back was partly from the lack of engagement the author created as well as, and this is big, the sheer amount of repetition. I get it, teachers need to say something 7 times for us to remember. But we could seriously have cut this book down by a 3rd and would likely be better off for it. It’s just too long for what it is. I don’t need the OPM story re-summzied 6 different ways from Sunday to get the point.
It’s a good book. Honestly, I’d even consider it a must-read for security folks. But maybe the 2nd edition can cut some of the fluff.
This book reminds me a lot of Darknet Diaries, which is where I first encountered many of these stories. Jack Syder, the host of Darknet Diaries, is fun, engaging, entertaining. He is a fantastic story-teller. I’d recommend checking out his podcast if you need a less-detailed, non-legislative/economic focused version of many of these events.
More Accurate Title
By The Time This Is Published, It Will Be Too Late: But Important Nonetheless
Audible Version Review
The audible version of this text is read by a professional female voice (Kate Redding). She is clear and easy to understand. I was able to easily listen at 2.0x speed, and even up to 2.25x at times. I was convinced this was the voice of an AI because she was able to pronounce words and names I could not even begin to spell. Overall, it’s a pleasant, if not serious sounding, voice.
- Reviewed in the United States on January 18, 2019
5.0 out of 5 stars Exceptionally well-written, readable history of data breaches and their aftermath
I'm teaching a college course on the history of viruses and malware and this book is unique in the subject material for its detailed reporting of the aftermath of cyber-attacks. Wolff shifts the focus away from purely technical solutions and blaming individuals for security lapses toward broader policy and regulation approaches that can hem in the cybercrime ecosystem. In addition to the aftermath reporting which is most unique, the many case studies of a variety of different breaches are well-written and exciting to read and provide an excellent survey of the many motivations, methods and outcomes of data breaches. An excellent book and a tremendous resource in the field.
Top reviews from other countries
- laurentReviewed in Japan on August 14, 2019
5.0 out of 5 stars Security by design is a key message
Major use cases about data breaches.
Recommended for executives to understand the risk and why that is important to have a strong security posture in order to protect the business