🔴 Active Ransomware Incident Response Day in the Life

preview_player
Показать описание
Want to know what its really like when you get called into a business that is fully owned by #Ransomware ?

Who do you talk to first?
What's the first question you'd ask?
How do you deal with the adrenaline of being on the clock against cyber criminals?

Join #SimplyCyber as we welcome Eric Taylor, CEO of Barricade Cyber Solutions and Senior Incident Response Engineer who lives his life in the FIRES of ransomware.

Live engagement, ask your questions, leave with knowledge

#cybersecurity
Рекомендации по теме
Комментарии
Автор

What a great conversation. I wish I didn't have to sleep, I just can't learn this fast enough. Thanks so much for the great content!

CyberFraudDawg
Автор

Just 1.7K views? Fk, this information is amazing and that should viral.

diegoperez
Автор

I would be very careful advising clients on their cyber coverages as a non-insurance professional (licensed and whatnot).

It’s one thing to unofficially, non-professionally discuss the policy but can end up falling back on you as the cyber expert if the client assumed their policy provided coverage that the insurer denied because you told them it would be covered. Ofc it’s all dependent on your relationship w/ the client but just be wary Especially in this area of insurance that’s still sort of being worked out by carriers. It’s all kinda wonky rn.

jbrandona
Автор

incident response sounds dreadful i dont want anything to do with it if possible

trblmkr
Автор

What if you pay and the attacker don’t send you the key?

fetz
Автор

I find this IR response is severely lacking. At no point did he talk about hardening the active directory and evicting the attacker from persistence in active directories such as the SD holder or plethora of other ways the attackers maintain persistence. There was no talk about hardening using tiering and implementing laps or anything of that sort. And why in God's name would you remote directly into the customer's domain controller? You want to find a domain controller that has not been compromised if possible and do a complete Forest build from that domain controller and then reset the rid 500 account multiple times and reset the identities for all service accounts and reset the password for literally every account. None of this was talked about in this incident response Day in the life of. I say skip these guys and call Microsoft dart team. They do all of this stuff routinely.

AlienWarTycoon