Artwork

Content provided by GRSee Consulting. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by GRSee Consulting or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The First 3 Crucial Steps After You Experience a Cybersecurity Incident: Nicholas Steinmann | Director, Insurance Alliances at Tetra Defense

38:34
 
Share
 

Manage episode 384961090 series 3530284
Content provided by GRSee Consulting. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by GRSee Consulting or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

00:35 Guest Introduction and professional journey

02:40 Icebreaker

04:00 How did the incident response domain evolve in the last decade

06:33 Timeline of a cybersecurity security incident. Timeline for a company that suffers a security incident.

10:50 The number 1 cause of most cybersecurity incident

15:30 What should a company prepare for a cybersecurity incident & attacks

17:50 How important are compliance standards in building a resilient & secure environment?

25:47 Are there ongoing threats and data exploitation that companies don't know about?

27:50 A case study for incident response project

32:32 The initiative for cybersecurity incidents from the U.S government.

36:43 What actions you should take after experiencing a cybersecurity incident?

Description Summary:

All the early-stage companies react differently to a cybersecurity incident but mostly this is how it goes in the most cases

An employee starts to report an issue in the network. Perhaps he or she cannot access a file on the network.
The issue gets reported to the IT department.
The IT department would diagnose the issue and realize that there’s a larger problem at hand.
From this stage, the information escalates to the boardroom.

The number one & most common cause of cybersecurity incidents is open RDP or a phishing attack if you’re not keeping up with the patches or you have unpatched VPNs & unpatched exchange servers. Mainly, The unpatched environment is the predominant method of intrusion for ransomware.

The threat actors which perpetrate the attack use free tools which are available online and conduct an external scan very quickly and exploit the findings. These tools are available online and they cost nothing.

This is what you should do to reduce cybersecurity incidents in your business:

  1. Ensure multiple-factor authentication on all your accounts like emails, VPN, etc.
  2. Regularly test backups, and be sure to keep them off the domain.
  3. Have an incident response plan, review it every quarter, and regularly update it.
  4. Introduce the principle of less privilege to make sure you’re limiting the number of people who have domain access & leading accounts.

If you just realized that you’ve experienced a cyberattack,

  1. Preserve all evidence, because if you wipe or change any evidence, it’ll be hard to trace how the threat actor was able to get inside your environment.
  2. Don't turn off any devices, just disconnect them from the internet.
  3. Don't engage in communication with the attackers.

Connect with Ben Ben-Aderet: https://www.linkedin.com/in/benbenaderet/

Connect with Nicholas: https://www.linkedin.com/in/nsteinmann/

  continue reading

85 episodes

Artwork
iconShare
 
Manage episode 384961090 series 3530284
Content provided by GRSee Consulting. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by GRSee Consulting or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

00:35 Guest Introduction and professional journey

02:40 Icebreaker

04:00 How did the incident response domain evolve in the last decade

06:33 Timeline of a cybersecurity security incident. Timeline for a company that suffers a security incident.

10:50 The number 1 cause of most cybersecurity incident

15:30 What should a company prepare for a cybersecurity incident & attacks

17:50 How important are compliance standards in building a resilient & secure environment?

25:47 Are there ongoing threats and data exploitation that companies don't know about?

27:50 A case study for incident response project

32:32 The initiative for cybersecurity incidents from the U.S government.

36:43 What actions you should take after experiencing a cybersecurity incident?

Description Summary:

All the early-stage companies react differently to a cybersecurity incident but mostly this is how it goes in the most cases

An employee starts to report an issue in the network. Perhaps he or she cannot access a file on the network.
The issue gets reported to the IT department.
The IT department would diagnose the issue and realize that there’s a larger problem at hand.
From this stage, the information escalates to the boardroom.

The number one & most common cause of cybersecurity incidents is open RDP or a phishing attack if you’re not keeping up with the patches or you have unpatched VPNs & unpatched exchange servers. Mainly, The unpatched environment is the predominant method of intrusion for ransomware.

The threat actors which perpetrate the attack use free tools which are available online and conduct an external scan very quickly and exploit the findings. These tools are available online and they cost nothing.

This is what you should do to reduce cybersecurity incidents in your business:

  1. Ensure multiple-factor authentication on all your accounts like emails, VPN, etc.
  2. Regularly test backups, and be sure to keep them off the domain.
  3. Have an incident response plan, review it every quarter, and regularly update it.
  4. Introduce the principle of less privilege to make sure you’re limiting the number of people who have domain access & leading accounts.

If you just realized that you’ve experienced a cyberattack,

  1. Preserve all evidence, because if you wipe or change any evidence, it’ll be hard to trace how the threat actor was able to get inside your environment.
  2. Don't turn off any devices, just disconnect them from the internet.
  3. Don't engage in communication with the attackers.

Connect with Ben Ben-Aderet: https://www.linkedin.com/in/benbenaderet/

Connect with Nicholas: https://www.linkedin.com/in/nsteinmann/

  continue reading

85 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play