Lewis | Locked Up | Buch | 978-1-394-35704-8 | www.sack.de

Buch, Englisch, 288 Seiten

Lewis

Locked Up

Cybersecurity Threat Mitigation Lessons from a Real-World Lockbit Ransomware Response
1. Auflage 2026
ISBN: 978-1-394-35704-8
Verlag: Wiley

Cybersecurity Threat Mitigation Lessons from a Real-World Lockbit Ransomware Response

Buch, Englisch, 288 Seiten

ISBN: 978-1-394-35704-8
Verlag: Wiley


A gripping true story about one ransomware attack and the hands-on lessons you can learn from it

In Locked Up: Lessons Learned from A Real-World LockBit Ransomware Response, veteran IT and cybersecurity executive Zachary Lewis, delivers a gripping, first-person account of how a major university squared off against one of the world's most infamous ransomware groups: LockBit. He walks you through his personal experience battling – and negotiating with – LockBit, as well as the strategies, tools, and approaches he used in resolving the crisis.

The book is a detailed, darkly funny, and behind-the-scenes account of an increasingly common and feared event for organizations of all types and sizes. It offers up-to-date advice for people tasked with preventing, responding to, and recovering from ransomware attacks. You'll find: - Insightful crisis management lessons applicable to both technical and business leaders
- Hands-on technical solutions you can apply to prevent catastrophic data loss during a ransomware event
- Techniques to manage the intense operational, emotional, and interpersonal challenges that arise in the midst of an unexpected crisis

Perfect for IT professionals, cybersecurity leaders, and business decision-makers in higher education, healthcare, government, and nonprofit organizations, Locked Up is also a must-read for business continuity planners, legal counsel, and anyone else with an interest in real-world cybersecurity.

Lewis Locked Up jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


Introduction: The Attack xv

PART I: LEADING TO THE ATTACK 1

Chapter 1: A New Breed of Criminals 3

Chapter 2: Easy Prey 31

Chapter 3: Cybersecurity at UHSP 51

PART II: RESPONDING TO THE ATTACK 67

Chapter 4: The Leadership Response 69

Chapter 5: The War Room 85

Chapter 6: Countdown to the Data Dump 101

PART III: RECOVERING FROM THE ATTACK 115

Chapter 7: The Data Dump 117

Chapter 8: Strengthening Security Post-Attack 133

Chapter 9: Reflections and Lessons Learned 151

PART IV: WHAT ORGANIZATIONS CAN DO 165

Chapter 10: Building a Resilient Cybersecurity Program 167

Chapter 11: Implementing Strong Technical Controls 193

Chapter 12: Responding to a Cyberattack 215

Epilogue: The Calm We Earned 237

Appendix: Cybersecurity Onboarding Checklist:

A 30–60–90–120-Day Plan 241

Acknowledgments 243

About the Author 245

Index 247



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.