Rowman & Littlefield Publishers
Pages: 208
Trim: 6⅜ x 9½
978-1-5381-2818-3 • Hardback • August 2020 • $105.00 • (£81.00)
978-1-5381-4278-3 • Paperback • August 2020 • $77.00 • (£59.00)
978-1-5381-2819-0 • eBook • August 2020 • $73.00 • (£56.00)
Robert M. Brzenchek is a professor of Criminal Justice in West Palm Beach, Florida where he educates the next generation of Criminal Justice professionals at various universities. In the public sector, Brzenchek worked with dozens of national agencies, governments, and international organizations in the use of advanced technologies and information sharing to detect violations of international laws, and threats as a Navy Intelligence Specialist and police officer in Washington, DC. Brzenchek has worked with organizations as diverse as DHS, DOD, major corporations, ports and public utilities on security matters, risk management, policy, and technologies; has served as a subject matter expert and testified in court cases; as well as lectured throughout North America and Mexico. Brzenchek has published several articles on gangs, emergency management, threat assessments, homeland and international security, and cybersecurity which may be found in PoliceOne.com and CorrectionsOne.com. He has also serves as a Board member of SERAPH, member of the OSS Society; Navy League; ILEETA, IADLEST, and member of the US Coast Guard Auxiliary.
Chapter 1: Introduction- Problem
- Purpose
- Theory
- Concepts
Review Questions:- What is the root problem?
- What is the Plan Do Check Act theory?
- Are gangs in nations like Russia or China that can be particularly resourceful and dangerous – secretly sponsoring hackers’ efforts and protecting them from international law enforcement?
Chapter 2: Prevention- Environment
- Education
- Socio-Economics
- Summary
Review Questions:- Does compliance with standards and laws protect a business and executives from liability?
- What education is appropriate to prepare a cyber professional for today’s cyber threats?
- What is the estimated economic loss from cyber crime annually?
Chapter 3: Historical First-Person Accounts- Washington DC metro
- Houston, TX
- New York City metro
- Summary
Review Questions:- What are your thoughts and impressions on the first person accounts?
- What takeaways can you apply to your current or future cyber career?
- Can you be as flexible to move around the country/world to complete training/work?
Chapter 4: Intervention- Purpose of ISO 27001/Cybersecurity Measures
- Theory of ISO 27001/Cybersecurity Measures
- Concepts of ISO 27001/Cybersecurity Measures
- Integrating ISO 27001/Cybersecurity Measures
Review Questions:- What is an ISMS?
- What is ISO 27001?
- How do you integrate the ISO 27001 cradle to grave?
Chapter 5: Suppression- Problem
- Purpose
- Concepts
- Operationalization
- Summary
Review Questions:- Do you think the newly created DHS National Risk Management Center will assist in implementing cybersecurity measures for financial services, telecommunications, and energy sectors?
- Are laws/measures such as Data Protection Law, NYS Cyber Security Law 18, Federal law, Including the Federal Information Security Management Act (FISMA), NIST 800-171, HIPAA, and GDPR enough for cyber professionals to protect our infrastructure?
- Are people, processes, and technologies vulnerabilities in cyber security?
Chapter 6: Findings and Conclusions- Recommendations
Review Questions:- What are your recommendations for America to bolster cyber security defenses?
- Do you think our current cyber security measures adequate?
- What are your next steps to share your knowledge obtained from this book?
Brzenchek offers a law enforcement practitioner's account of individuals and groups that pose cybersecurity threats in the US. Relying on the contributions of a former FBI agent, corporate compliance counsel, the Defense Department's transnational threats division, and a criminal's insider account, he addresses issues presented by gangs and transnational organized crime as well as cybersecurity threats and countering threat networks in 12 chapters. The text relies heavily on first-person accounts from those working in the field, including both former criminals and persons employed in law enforcement and threat assessment. The material on transnational organized crime focuses on the role of technology in posing threats, describing ways to counter these threats through surveillance and better information management. Interesting insights emerge from observations of several subjects working in this space, for example: "little is being done on a national level to mitigate risk to our national security." A unique thrust of the book is the argument that motivational interviewing (designed to help a person recognize available resources and strengths that have been previously overlooked) can be effective for preventing participation in transnational organized crime groups and networks. Recommended.
— Choice Reviews
- Developed by a nationally awarded educator, military member, and law enforcement officer.
- Builds rapport with readers through theory to practice, enhancing educational and professional environments.
- Provides a road map through every step from prevention to suppression.
- Develops an understanding of the substantive organized crime/gang concepts/backgrounds that underlie the true issue.
- Examines the ins and outs of transnational organized crime/gangs and cybersecurity intervention and prevention techniques with any group of learners.
- Provides an understanding of the key approaches and methodology specific to organized crime/gang and cybersecurity prevention, intervention, and suppression.
- Provides historical first-hand accounts and lessons learned.
9/30/21, Choice: This book was included in a roundup of "Top 75 Community College Titles."
Link: https://www.choice360.org/choice-pick/the-top-75-community-college-titles-september-2021-edition/