Discover new selections
Limited-time Offer
$0.99/month for 3 months
$0.99
  • Limited-Time Offer: Get Audible Premium Plus for $0.99 a month for the first 3 months.
  • You'll receive 1 credit a month to pick ANY title from our entire premium selection to keep forever (you'll use your first credit now).
  • You'll also get UNLIMITED listening to select audiobooks, Audible Originals, and podcasts.
  • After 3 months, $14.95 /mo. Cancel online anytime.
Sold and delivered by Audible, an Amazon company
Your audiobook is waiting!
  • One credit a month to pick any title from our entire premium selection to keep (you’ll use your first credit now).
  • Unlimited listening on select audiobooks, Audible Originals, and podcasts.
  • You will get an email reminder before your trial ends.
  • $14.95 a month after 30 days. Cancel online anytime.
Sold and delivered by Audible, an Amazon company
List Price: $17.90
By completing your purchase, you agree to Audible’s Conditions Of Use. and Amazon's Privacy Notice. Taxes where applicable.
Sold and delivered by Audible, an Amazon company

You'll See This Message When It Is Too Late: The Legal and Economic Aftermath of Cybersecurity Breaches Audible Audiobook – Unabridged

4.6 out of 5 stars 39 ratings

Cybersecurity incidents make the news with startling regularity. Each breach - the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump - makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that.

In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches.

Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks - financial gain, espionage, and public humiliation of the victims - that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns.

The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at US-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.

PLEASE NOTE: When you purchase this title, the accompanying PDF will be available in your Audible Library along with the audio.

Read & Listen

Switch between reading the Kindle book & listening to the Audible audiobook with Whispersync for Voice.
Get the Audible audiobook for the reduced price of $2.18 after you buy the Kindle book.
$0.99/month for the first 3 months
For a limited time, save 90% on Audible. Get this deal

Product details

Part of series Information Policy
Listening Length 14 hours
Author Josephine Wolff
Narrator Kate Reading
Whispersync for Voice Ready
Audible.com Release Date November 13, 2018
Publisher Blackstone Audio, Inc.
Program Type Audiobook
Version Unabridged
Language English
ASIN B07K6STT1Y
Best Sellers Rank #294,591 in Audible Books & Originals (See Top 100 in Audible Books & Originals)
#65 in Science & Technology Public Policy
#138 in Computer & Internet Law
#178 in Science & Technology Law (Books)

Customer reviews

4.6 out of 5 stars
39 global ratings

Review this product

Share your thoughts with other customers

Top reviews from the United States

  • Reviewed in the United States on November 30, 2018
    Prof. Wolff has done an excellent job of explaining how current cybersecurity issues have as much to do with business, policy, and law as actual technology flaws. By focusing on six large cyber attacks, she helps both lay readers and IT professionals understand how conflicting interests and complexities in assessing liability and blame confound our efforts to keep the internet secure. After reading this book I changed all my passwords - again.
  • Reviewed in the United States on May 26, 2019
    Disclosures: I do not know the author; I did buy the book from Amazon; I am not a robot. I thought this was a very intelligent analysis of the situation we are all in regarding cybersecurity. The first part of the book is a clear analysis of breaches in several domains: finance, espionage, and public humiliation. All of this information is already in the public domain, but not in one place. Very useful compilation of information. One missing sector: healthcare. The second part of the book discusses how we can prevent breaches. The author's perspective is to include the entire scope of the breach transaction, including converting stolen cards to cash and stolen trade secrets to increased product sales. Her view is that government policy makers need to play a more active role, since no one private actor has control over the breach chain, outside their own organization. Many will support this view, but we do not yet have the political will to make effective changes to policy. Such changes may happen incrementally. This second section is a very good analysis of the roles played by all participants in a security breach. I would give the book 5 stars on content, but found the text a little wordy, so reduced my review to 4 stars.
    4 people found this helpful
    Report
  • Reviewed in the United States on December 22, 2018
    Most of the news coverage on data breaches is little more than a round of finger pointing and cries for the heads of the corporate executives involved. Professor Wolff provides a thoughtful and actionable analysis of breaches and what we can all do to mitigate them, whether as an IT professional, policy maker, or citizen.
    One person found this helpful
    Report
  • Reviewed in the United States on March 3, 2019
    This book is a must-read for anyone concerned about the future of data security - which should be all of us. Josephine does a great job of balancing information with fascinating storytelling. It's a very enjoyable read and such an important book for our time.
  • Reviewed in the United States on January 16, 2023
    Who is this for?
    The intended audience is likely cybersecurity professional, legislators, lawyers, and C-suite folks (particularly the CTO or CISO). This text tosses around technical jargon and acronyms like candy on Halloween. While the author does make an attempt to explain many concepts, it would be unreasonable for her to explain them all. If you don’t know the following terms, it may be a difficult read: IP addresses, certificate authority, botnet, endpoint protection, firewall/router/switches.

    It’s unlikely this was intended for a broader audience, such as the average user of technology, which is a shame. It’s slightly too technical to be friendly to the average user. If you’re smarter than the average bear and are interested in some of the most serious breaches of our lifetime, then it might be worth giving it a try.

    My Thoughts:
    So, I’m a cybersecurity analyst, right? I’ve heard about many of these breaches already. In fact, of the 9 main incidents, I knew about 7 of them. Did that make this less useful to me? Probably not. The reason for that is the slant: the legislative and economic ramifications of breaches. My previous interaction with similar material was more on the technical front, not financial. It was good to see a bigger-picture on how and why things played out the way they did.

    I’m glad I read (listened) to this, but I probably would not do it again, unless I had to write a term paper or something. It’s pretty dry. If you told me nothing about the author, I’d stake my next paycheck that it was written by a professor. It reads like a lecture. It’s just a ton of information and facts and details and all good stuff to know, but it’s just not…entertaining or relatable or even fun. Parts were kind of a drag, for instance, when the US government was breached, folks were just pointing fingers at each other, shifting blame around. I think the government needs a good lesson in leadership from Jocko on extreme ownership, but I digress.

    The last section was terribly boring to me. I missed a good portion of it and didn’t much care to re-listen. My un-willingness to go back was partly from the lack of engagement the author created as well as, and this is big, the sheer amount of repetition. I get it, teachers need to say something 7 times for us to remember. But we could seriously have cut this book down by a 3rd and would likely be better off for it. It’s just too long for what it is. I don’t need the OPM story re-summzied 6 different ways from Sunday to get the point.

    It’s a good book. Honestly, I’d even consider it a must-read for security folks. But maybe the 2nd edition can cut some of the fluff.

    This book reminds me a lot of Darknet Diaries, which is where I first encountered many of these stories. Jack Syder, the host of Darknet Diaries, is fun, engaging, entertaining. He is a fantastic story-teller. I’d recommend checking out his podcast if you need a less-detailed, non-legislative/economic focused version of many of these events.

    More Accurate Title
    By The Time This Is Published, It Will Be Too Late: But Important Nonetheless

    Audible Version Review
    The audible version of this text is read by a professional female voice (Kate Redding). She is clear and easy to understand. I was able to easily listen at 2.0x speed, and even up to 2.25x at times. I was convinced this was the voice of an AI because she was able to pronounce words and names I could not even begin to spell. Overall, it’s a pleasant, if not serious sounding, voice.
  • Reviewed in the United States on January 18, 2019
    I'm teaching a college course on the history of viruses and malware and this book is unique in the subject material for its detailed reporting of the aftermath of cyber-attacks. Wolff shifts the focus away from purely technical solutions and blaming individuals for security lapses toward broader policy and regulation approaches that can hem in the cybercrime ecosystem. In addition to the aftermath reporting which is most unique, the many case studies of a variety of different breaches are well-written and exciting to read and provide an excellent survey of the many motivations, methods and outcomes of data breaches. An excellent book and a tremendous resource in the field.

Top reviews from other countries

  • laurent
    5.0 out of 5 stars Security by design is a key message
    Reviewed in Japan on August 14, 2019
    Major use cases about data breaches.
    Recommended for executives to understand the risk and why that is important to have a strong security posture in order to protect the business