Security Program
-
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Auteur(s): Bruce Brown, convocourses
- Narrateur(s): Kim Pepper
- Durée: 3 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In today's digital age, safeguarding your organization's assets from cyber threats is paramount. Equip yourself with the knowledge and tools necessary with Cyber Security Program and Policy Using NIST Cybersecurity Framework by seasoned cybersecurity professionals. This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks.
-
Cyber Security Program and Policy Using NIST Cybersecurity Framework
- NIST Cybersecurity Framework (CSF), Book 2
- Narrateur(s): Kim Pepper
- Série: NIST Cybersecurity Framework, Livre 2
- Durée: 3 h et 29 min
- Date de publication: 2023-09-25
- Langue: Anglais
-
This guide steers you through the process of creating robust, professional documents and procedures designed to protect your data and digital assets from evolving cyber risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Auteur(s): Perry Carpenter, Kevin Mitnick - foreword
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
When all other processes, controls, and technologies fail, humans are your last line of defense. But, how can you prepare them? Frustrated with ineffective training paradigms, most security leaders know that there must be a better way. A way that engages users, shapes behaviors, and fosters an organizational culture that encourages and reinforces security-related values. The good news is that there is hope. That's what Transformational Security Awareness is all about.
-
-
Great title, audio format is a little rough
- Écrit par Vince le 2023-02-13
-
Transformational Security Awareness
- What Neuroscientists, Storytellers, and Marketers Can Teach Us About Driving Secure Behaviors
- Narrateur(s): Stephen Bel Davies
- Durée: 12 h et 20 min
- Date de publication: 2020-07-21
- Langue: Anglais
-
Transformational Security Awareness empowers security leaders with the information and resources they need to assemble and deliver effective world-class security awareness training programs that drive secure behaviors and culture change....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 27,83$ ou 1 crédit
Prix réduit: 27,83$ ou 1 crédit
-
-
-
The Jakarta Method
- Washington's Anticommunist Crusade and the Mass Murder Program That Shaped Our World
- Auteur(s): Vincent Bevins
- Narrateur(s): Tim Paige
- Durée: 9 h et 58 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In 1965, the US government helped the Indonesian military kill approximately one million innocent civilians. This was one of the most important turning points of the 20th century, eliminating the largest communist party outside China and the Soviet Union and inspiring copycat terror programs in faraway countries like Brazil and Chile. But these events remain widely overlooked, precisely because the CIA's secret interventions were so successful.
-
-
unconscious vs conscious bias
- Écrit par Wells Cushnie le 2021-09-11
-
The Jakarta Method
- Washington's Anticommunist Crusade and the Mass Murder Program That Shaped Our World
- Narrateur(s): Tim Paige
- Durée: 9 h et 58 min
- Date de publication: 2020-05-19
- Langue: Anglais
-
In 1965, the US government helped the Indonesian military kill approximately one million innocent civilians. This was one of the most important turning points of the 20th century, eliminating the largest communist party outside China and the USSR and inspiring copycat terror programs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,27$ ou 1 crédit
Prix réduit: 28,27$ ou 1 crédit
-
-
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Auteur(s): Brian Allen, Brandon Bapst, Terry Allan Hicks - contributor
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs. Ideal for corporate directors, senior executives, security risk practitioners, and auditors at many levels, this guide offers both the strategic insight and tactical guidance you're looking for.
-
Building a Cyber Risk Management Program
- Evolving Security for the Digital Age
- Narrateur(s): Mike Lenz
- Durée: 8 h et 46 min
- Date de publication: 2024-02-20
- Langue: Anglais
-
Cyber risk management is one of the most urgent issues facing enterprises today. This book presents a detailed framework for designing, developing, and implementing a cyber risk management program that addresses your company's specific needs....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- Auteur(s): Chris Moschovitis
- Narrateur(s): Sean Pratt
- Durée: 9 h et 9 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive. From understanding the need, to core risk management principles, to threats, tools, roles, and responsibilities, this book walks the listener through each step of developing and implementing a cybersecurity program. If you're a business manager or executive who needs to make sense of cybersecurity, this audiobook demystifies it for you.
-
-
Really excellent guide very well read
- Écrit par Joel C LaRusic le 2019-08-29
-
Cybersecurity Program Development for Business
- The Essential Planning Guide
- Narrateur(s): Sean Pratt
- Durée: 9 h et 9 min
- Date de publication: 2018-06-26
- Langue: Anglais
-
This essential guide, with its dozens of examples and case studies, breaks down every element of the development and management of a cybersecurity program for the executive....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 22,26$ ou 1 crédit
Prix réduit: 22,26$ ou 1 crédit
-
-
-
From Russia with Blood
- The Kremlin's Ruthless Assassination Program and Vladimir Putin's Secret War on the West
- Auteur(s): Heidi Blake
- Narrateur(s): Marisa Calin
- Durée: 10 h et 37 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The untold story of how Russia refined the art and science of targeted assassination abroad—while Western spies watched in horror as their governments failed to guard against the threat. Unflinchingly documenting the growing web of death on British and American soil, Heidi Blake bravely exposes the Kremlin's assassination campaign as part of Putin's ruthless pursuit of global dominance—and reveals why Western governments have failed to stop the bloodshed.
-
-
Phenomenal
- Écrit par Kimberley Clark le 2022-10-28
-
From Russia with Blood
- The Kremlin's Ruthless Assassination Program and Vladimir Putin's Secret War on the West
- Narrateur(s): Marisa Calin
- Durée: 10 h et 37 min
- Date de publication: 2019-11-19
- Langue: Anglais
-
The untold story of how Russia refined the art and science of targeted assassination abroad—while Western spies watched in horror as their governments failed to guard against the threat....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 28,27$ ou 1 crédit
Prix réduit: 28,27$ ou 1 crédit
-
-
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Auteur(s): David Rauschendorfer
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Every organization today faces an ever-changing set of threats in this digital landscape. Understanding how to develop a functional information security program to protect your organization’s reputation and brand from being tarnished due to a breach of your company’s sensitive information is more critical than ever. Developing a functional program that sets up the best information security practices across the organization’s operational workflows, is the leading practice for protecting against a possible breach.
-
Complete Guide to Building an Information Security Program
- Connecting Policies, Procedures, & IT Standards
- Narrateur(s): Lauren Garvin
- Durée: 1 h et 31 min
- Date de publication: 2021-11-12
- Langue: Anglais
-
Every organization today faces an ever-changing set of threats in this digital landscape....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Assassination Complex
- Inside the Government's Secret Drone Warfare Program
- Auteur(s): Jeremy Scahill, The Staff of The Intercept, Edward Snowden - foreword, Autres
- Narrateur(s): George Newbern, Jeremy Scahill - introduction, Glenn Greenwald - afterword
- Durée: 5 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Major revelations about the US government's drone program - best-selling author Jeremy Scahill and his colleagues at the investigative website The Intercept expose stunning new details about America's secret assassination policy.
-
The Assassination Complex
- Inside the Government's Secret Drone Warfare Program
- Narrateur(s): George Newbern, Jeremy Scahill - introduction, Glenn Greenwald - afterword
- Durée: 5 h et 13 min
- Date de publication: 2016-05-03
- Langue: Anglais
- Jeremy Scahill and his colleagues at the investigative website The Intercept expose stunning new details about America's secret assassination policy....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,44$ ou 1 crédit
Prix réduit: 18,44$ ou 1 crédit
-
-
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Auteur(s): National Institute of Standards and Technology
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
Ransomware is a type of malicious attack where attackers encrypt an organization’s data and demand payment to restore access. This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events. That includes helping to gauge an organization’s level of readiness to counter ransomware threats and to deal with the potential consequences of events.
-
NIST Cybersecurity & Privacy Program + Ransomware Risk Management: A Cybersecurity Framework Profile
- Narrateur(s): Tom Brooks
- Durée: 1 h et 50 min
- Date de publication: 2022-04-04
- Langue: Anglais
-
This Ransomware Profile identifies the Cybersecurity Framework Version 1.1 security objectives that support identifying, protecting against, detecting, responding to, and recovering from ransomware events. The profile can be used as a guide to managing the risk of ransomware events....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Agenda 21, an Analysis
- The UN Global Program for Sustainable Development
- Auteur(s): Julian Chitta
- Narrateur(s): Ruth Golding
- Durée: 3 h et 5 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This is a short but comprehensive analysis of the UN's controversial program established in 1992 as a "sustainable development plan" for the entire world, for the 21st century. Its main points are coincidental to the "Communist Manifesto", issued by Karl Marx in 1848. It includes the abolition of all private property, banning inheritances, reducing the population, and the transfer of all resources into the hands of UN bureaucrats.
-
Agenda 21, an Analysis
- The UN Global Program for Sustainable Development
- Narrateur(s): Ruth Golding
- Durée: 3 h et 5 min
- Date de publication: 2014-08-20
- Langue: Anglais
- This is a short but comprehensive analysis of the UN's controversial program established in 1992 as a "sustainable development plan" for the entire world, for the 21st century....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 19,78$ ou 1 crédit
Prix réduit: 19,78$ ou 1 crédit
-
-
-
NIST Cybersecurity & Privacy Program and Cyber Security, a Battle We Can't Lose
- Start Protecting Your Personal and Business Data
- Auteur(s): NIST, Tom Brooks
- Narrateur(s): Tom Brooks
- Durée: 3 h et 3 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public. Our work ranges from specific information that can be put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.
-
NIST Cybersecurity & Privacy Program and Cyber Security, a Battle We Can't Lose
- Start Protecting Your Personal and Business Data
- Narrateur(s): Tom Brooks
- Durée: 3 h et 3 min
- Date de publication: 2021-11-11
- Langue: Anglais
-
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 18,74$ ou 1 crédit
Prix réduit: 18,74$ ou 1 crédit
-
-
-
NIST Cybersecurity & Privacy Program
- Auteur(s): National Institute of Standards and Technology (NIST)
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public. Our work ranges from specific information that can be put into practice immediately to longer-term research that anticipates advances in technologies and future challenges.
-
NIST Cybersecurity & Privacy Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 14 min
- Date de publication: 2021-07-19
- Langue: Anglais
-
The National Institute of Standards and Technology (NIST) develops cybersecurity standards, guidelines, best practices, and other resources to meet the needs of US industry, federal agencies, and the broader public....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
The Forever Prisoner
- The Full and Searing Account of the CIA's Most Controversial Covert Program
- Auteur(s): Cathy Scott-Clark, Adrian Levy
- Narrateur(s): Jamie Renell
- Durée: 16 h et 48 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In The Forever Prisoner, Cathy Scott-Clark and Adrian Levy recount dramatic scenes inside multiple black sites around the world through the eyes of those who were there, trace the twisted legal justifications, and chart how enhanced interrogation, a key “weapon” in the global “War on Terror,” metastasized over seven years, encompassing dozens of detainees in multiple locations, some of whom died. Ultimately that war has cost 8 trillion dollars and 900,000 lives, while the U.S. Senate judged enhanced interrogation was torture and had produced zero high-value intelligence.
-
The Forever Prisoner
- The Full and Searing Account of the CIA's Most Controversial Covert Program
- Narrateur(s): Jamie Renell
- Durée: 16 h et 48 min
- Date de publication: 2022-04-12
- Langue: Anglais
-
Some argued it would save the U.S. after 9/11. Instead, the CIA’s enhanced interrogation program came to be defined as American torture....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 37,53$ ou 1 crédit
Prix réduit: 37,53$ ou 1 crédit
-
-
-
Ransomware Trends 2021
- Leadership for IT Security & Privacy HHS Cybersecurity Program
- Auteur(s): Office of Information Security
- Narrateur(s): Tom Brooks
- Durée: 1 h et 6 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
This audiobook covers Overview of HC3 Observations and Research; Top Ransomware Groups Impacting Healthcare; Healthcare Industry Victimization by Ransomware; US States with the Most Ransomware Incidents; Data Leak Trends for the US Healthcare Sector; Sophos Ransomware in Healthcare Report; State-Sponsored Ransomware; and more.
-
Ransomware Trends 2021
- Leadership for IT Security & Privacy HHS Cybersecurity Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 6 min
- Date de publication: 2021-06-19
- Langue: Anglais
-
This audiobook covers Overview of HC3 Observations and Research; Top Ransomware Groups Impacting Healthcare; Healthcare Industry Victimization by Ransomware; US States with the Most Ransomware Incidents; Data Leak Trends for the US Healthcare Sector; and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 4,95$ ou 1 crédit
Prix réduit: 4,95$ ou 1 crédit
-
-
-
Cybersecurity Program Best Practices
- Auteur(s): United States Department of Labor
- Narrateur(s): Tom Brooks
- Durée: 1 h et 13 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks.
-
Cybersecurity Program Best Practices
- Narrateur(s): Tom Brooks
- Durée: 1 h et 13 min
- Date de publication: 2021-07-13
- Langue: Anglais
-
ERISA-covered plans often hold millions of dollars or more in assets and maintain personal data on participants, which can make them tempting targets for cyber-criminals. Responsible plan fiduciaries have an obligation to ensure proper mitigation of cybersecurity risks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Hive Ransomware
- HHS Cybersecurity Program
- Auteur(s): Office of Information Security
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more.
-
Hive Ransomware
- HHS Cybersecurity Program
- Narrateur(s): Tom Brooks
- Durée: 1 h et 17 min
- Date de publication: 2021-11-11
- Langue: Anglais
-
General efforts to help prevent ransomware attacks include maintaining offline, encrypted backups of data and regularly testing your backups; creating, maintaining, and exercising a basic cyber incident response plan, resiliency plan, and associated communications plan, and more....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Fentanyl
- The CCP’s Covert Program to Attack America
- Auteur(s): Erik Lawrence
- Narrateur(s): David Piper
- Durée: 2 h et 18 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
In exploring this complex and deeply troubling issue, it is my hope that this book will shed light on the darker corners of the fentanyl epidemic and the unconventional warfare tactics employed by the Chinese and the Mexican drug cartels. By understanding the multifaceted nature of the crisis and the insidious strategies behind it, we can begin to formulate effective responses and work together to protect the health, safety, and well-being of the American public.
-
Fentanyl
- The CCP’s Covert Program to Attack America
- Narrateur(s): David Piper
- Durée: 2 h et 18 min
- Date de publication: 2023-09-08
- Langue: Anglais
-
In exploring this complex and deeply troubling issue, it is my hope that this book will shed light on the darker corners of the fentanyl epidemic and the unconventional warfare tactics employed by the Chinese and the Mexican drug cartels....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-
-
-
Pipeline Cybersecurity
- Federal Programs: Congressional Research Service
- Auteur(s): Congressional Research Service
- Narrateur(s): Tom Brooks
- Durée: 1 h et 29 min
- Version intégrale
-
Au global
-
Performance
-
Histoire
The vast US network of natural gas, crude oil, and refined product pipelines is integral to US energy supply and also has vital links to other critical infrastructure such as power plants and airports. This network is vulnerable to cyberattacks. Pipeline companies employ technologies which enable them to achieve business and operational efficiencies, but these technologies are susceptible to cybersecurity risks - and these risks have been growing. The May 2021 ransomware attack against the Colonial Pipeline, which disrupted gasoline supplies throughout the East Coast.
-
Pipeline Cybersecurity
- Federal Programs: Congressional Research Service
- Narrateur(s): Tom Brooks
- Durée: 1 h et 29 min
- Date de publication: 2021-09-28
- Langue: Anglais
-
The vast US network of natural gas, crude oil, and refined product pipelines is integral to US energy supply and also has vital links to other critical infrastructure such as power plants and airports. This network is vulnerable to cyberattacks....
Échec de l'ajout au panier.
Veuillez réessayer plus tardÉchec de l'ajout à la liste d'envies.
Veuillez réessayer plus tardÉchec de la suppression de la liste d’envies.
Veuillez réessayer plus tardÉchec du suivi du balado
Ne plus suivre le balado a échoué
Prix courant: 8,71$ ou 1 crédit
Prix réduit: 8,71$ ou 1 crédit
-