Podcast: In the Ransomware Recovery Trenches

Avatar photo
Conor Quinlan

Episode Summary

The impact of ransomware on organizations is well-known. Companies can be coerced into making ransom payments. The business itself could be forced to close. Sensitive customer data can be leaked onto the Dark Web. An impacted organization’s IT environment may have to be rebuilt from scratch. The impact of ransomware to the employees of the impacted organization is not as well known or discussed.

Tony Kirtley is the Director of Cyber Risk Partnerships at Secureworks. He joins the episode to discuss what it is like on the ground when ransomware strikes and employees attempt to recover the environment. Airiam Field CISO/CIO Art Ocain also shares his first-hand experience in the episode. They both recall the extreme emotions that accompany ransomware response. Responsible people at the victim organization can suffer health impacts and hospitalizations from the experience. To get the best outcome from a response engagement, they recommend responders:

  • Set and communicate realistic expectations regarding timelines with senior leadership and board members.
  • Keep calm despite the stressful situation. The impacted organization is often under significant stress. A calm presence helps the team.
  • Work with the right partner who is a master of their domain of expertise. In the case or Secureworks and Airiam, Secureworks deploys their Taegis XDR while Airiam performs “hands-on-keyboard” rebuilding activities as part of the AirRescue™ offering.

Reducing the likelihood of ransomware in the first place is also important. Tony and Art shared some tips for that as well, including:

  • Develop an incident response plan with primaries and backups for each role. The contacts must be aware of the role responsibilities.
  • Patch your systems when updates are available. Tony noted that vulnerabilities were the most common attack vector in a recent report.
  • Get visibility into endpoints using endpoint detection and response software.
  • Diligently understand and configure Active Directory (AD) and the security features it has built in. In 100% of the incidents that Tony has worked on, domain admin access was achieved to deploy ransomware at scale.

In the end, Tony’s takeaway is that companies don’t need to build a massive fortress. IT leaders at organizations need the visibility into their environment and strong walls safeguarding their important assets.

Video Version

Listen to more episodes at www.airiam.com/podcast, on Spotify, Apple Podcasts, Google Podcasts, Amazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Airiam Hires Alan Villaseñor to Build and Manage SOC

Airiam, a managed IT and cybersecurity company with a deep focus and expertise on ransomware recovery, cyber resilience, and immutable backups today announced Alan Villaseñor will lead the company’s security operation center (SOC). Villaseñor holds CIS
Avatar photo
Conor Quinlan
>>Read More

Tips and Tricks for Surviving a Long Cybersecurity Conference

Attending a long cybersecurity conference can be both exciting and exhausting. With back-to-back conferences like Black Hat and DEFCON in Las Vegas, you can expect even more excitement and exhaustion. However, you don’t need to freak out! With the righ
Vivian Lee
>>Read More

Internal Penetration Testing and Small Businesses

Internal Penetration Testing What is Internal Penetration Testing? You may be thinking, “What even is an internal penetration test?” There is just something wrong about the phrase when you say it. The way it rolls off the tongue is just odd. Internal p
Avatar photo
Andy Gritzer
>>Read More