Rebuild Your Business After an Attack: Threat Actors Webinar

Vivian Lee

Rebuild Your Business: Webinar Summary

Airiam and MOXFIVE wrapped up the second of our Threat Actors webinar series! Art Ocain and Ben Hartwick were great hosts walking us through a ton of information on how to rebuild your business after an attack.

Systematic Approach

From incident scoping to determining if your backups are valid, making sure there is a system in place is the fastest way to rebuild your business. It all starts with incident scoping, a crucial step in understanding the extent of the breach. Then, rally the tech troops and align your teams for a coordinated kick-off, ensuring everyone is on the same page. One pivotal question to address is whether your organization has an incident response plan in place. Unfortunately, many businesses do not. Having a well-defined plan greatly streamlines the recovery process. Lastly, check if your backups are valid; they are often your lifeline in restoring critical data and systems. In summary, following these systematic steps is the fastest and most effective way to rebuild your business in the aftermath of a cyber attack.

Restoration

Moving onto restoration, there are a few steps you should take to recover your business. Art and Ben break it down to the steps below:

  • Determine all assets in the environment
  • Prioritize those assets
  • Restore critical systems
  • Restore remainder of devices

Prompt Activation of Incident Response Plan

To ensure your incident response plan is enabled quickly and effectively, it’s important to review these steps with your team BEFORE anything happens. Once the activation occurs, your business should:

  • Determine specific roles for the team
  • Ensure communication timing with teams
  • Establish war room or standing cadence
  • Technical calls
  • Exec overview calls

After Restoring

Once your business has been restored, you should not stop moving.

  • Ensure tools are in place to continually protect environment
  • Start up some end user training to prevent future occurrences
  • Review the lessons learned from the initial attack and/or from the process of rebuilding
  • Focus on building your business’s resiliency for the future

Register for More Webinars

Register for our next webinars! Airiam is hosting our next series of webinars in collaboration with our partners! Each partner will help us walk through 4 key moments of a threat actor attack. Next up is “How to Prepare Your Company for Future Attacks” with ThreatLocker.

DATE TOPIC PARTNER REGISTER
July 19, 11AM EST Live Attack Simulation Watch Here
August 29, 12PM EST How to Defend Your Company During an Attack Watch Here
September 19, 12PM EST How to Rebuild Your Company After an Attack Watch Here
October 11, 11AM EST How to Prepare Your Company for Future Attacks Register Here

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Office 365 Working with OpenDNS

Office 365 Working with OPENDNS We ran into some issues the other day with our client running Office365. Activation and a few other issues due to OpenDNS Enterprise running on their network. We worked with support and got the full list of domains to wh
Avatar photo
Anthony Lewis
>>Read More

Building Cyber-Resilient Teams: 14 Strategies for Business Leaders

Cyber threats are on the rise, and it’s impossible to stay off bad actors’ radars. You can’t run, and you can’t hide, but you can build cyber-resilient teams ready to anticipate, withstand, and recover from cyber incidents. While technology plays an im
Vivian Lee
>>Read More

Cyber Compliance: Your Untapped Competitive Advantage

Most business leaders still view cybersecurity compliance as the corporate equivalent of a dental cleaning: necessary, expensive, and something they’d rather not think about. But when a single ransomware attack costs nearly $2 million, that mindset isn
Jesse Sumrak
>>Read More