Chapter 1: Introduction Problem Purpose Theory Concepts Review Questions: What is the root problem? What is the Plan Do Check Act theory? Are gangs in nations like Russia or China that can be particularly resourceful and dangerous - secretly sponsoring hackers' efforts and protecting them from international law enforcement? Chapter 2: Prevention Environment Education Socio-Economics Summary Review Questions: Does compliance with standards and laws protect a business and executives from liability? What education is appropriate to prepare a cyber professional for today's cyber threats? What is the estimated economic loss from cyber crime annually? Chapter 3: Historical First-Person Accounts Washington DC metro Houston, TX New York City metro Summary Review Questions: What are your thoughts and impressions on the first person accounts? What takeaways can you apply to your current or future cyber career? Can you be as flexible to move around the country/world to complete training/work? Chapter 4: Intervention Purpose of ISO 27001/Cybersecurity Measures Theory of ISO 27001/Cybersecurity Measures Concepts of ISO 27001/Cybersecurity Measures Integrating ISO 27001/Cybersecurity Measures Review Questions: What is an ISMS? What is ISO 27001? How do you integrate the ISO 27001 cradle to grave? Chapter 5: Suppression Problem Purpose Concepts Operationalization Summary Review Questions: Do you think the newly created DHS National Risk Management Center will assist in implementing cybersecurity measures for financial services, telecommunications, and energy sectors? Are laws/measures such as Data Protection Law, NYS Cyber Security Law 18, Federal law, Including the Federal Information Security Management Act (FISMA), NIST 800-171, HIPAA, and GDPR enough for cyber professionals to protect our infrastructure? Are people, processes, and technologies vulnerabilities in cyber security? Chapter 6: Findings and Conclusions Recommendations Review Questions: What are your recommendations for America to bolster cyber security defenses? Do you think our current cyber security measures adequate? What are your next steps to share your knowledge obtained from this book?