Search
Close this search box.

Podcast: In the Ransomware Recovery Trenches

Avatar photo
Bill Bowman

Episode Summary

The impact of ransomware on organizations is well-known. Companies can be coerced into making ransom payments. The business itself could be forced to close. Sensitive customer data can be leaked onto the Dark Web. An impacted organization’s IT environment may have to be rebuilt from scratch. The impact of ransomware to the employees of the impacted organization is not as well known or discussed.

Tony Kirtley is the Director of Cyber Risk Partnerships at Secureworks. He joins the episode to discuss what it is like on the ground when ransomware strikes and employees attempt to recover the environment. Airiam Field CISO/CIO Art Ocain also shares his first-hand experience in the episode. They both recall the extreme emotions that accompany ransomware response. Responsible people at the victim organization can suffer health impacts and hospitalizations from the experience. To get the best outcome from a response engagement, they recommend responders:

  • Set and communicate realistic expectations regarding timelines with senior leadership and board members.
  • Keep calm despite the stressful situation. The impacted organization is often under significant stress. A calm presence helps the team.
  • Work with the right partner who is a master of their domain of expertise. In the case or Secureworks and Airiam, Secureworks deploys their Taegis XDR while Airiam performs “hands-on-keyboard” rebuilding activities as part of the AirRescue™ offering.

Reducing the likelihood of ransomware in the first place is also important. Tony and Art shared some tips for that as well, including:

  • Develop an incident response plan with primaries and backups for each role. The contacts must be aware of the role responsibilities.
  • Patch your systems when updates are available. Tony noted that vulnerabilities were the most common attack vector in a recent report.
  • Get visibility into endpoints using endpoint detection and response software.
  • Diligently understand and configure Active Directory (AD) and the security features it has built in. In 100% of the incidents that Tony has worked on, domain admin access was achieved to deploy ransomware at scale.

In the end, Tony’s takeaway is that companies don’t need to build a massive fortress. IT leaders at organizations need the visibility into their environment and strong walls safeguarding their important assets.

Video Version

Listen to more episodes at www.airiam.com/podcast, on Spotify, Apple Podcasts, Google Podcasts, Amazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Airiam Named a Pioneer MSP

CRN Selects Airiam as Member of Pioneer 250 Airiam has been selected as a member of CRN’s Managed Service Provider (MSP) 500. CRN is a media brand from The Channel Company. The company provides news, analysis, and insight related to the IT technology c
Avatar photo
Bill Bowman
>>Read More

Internal vs. External Penetration Testing Discussed

  What Does Penetration Testing Do and Why Is It Important? Everyone says an organization should conduct a penetration test. But some companies don’t care about it. Some people are not sure how often to a conduct a penetration test. Let’s just ste
Avatar photo
Art Ocain
>>Read More

Resilience – Airiam Cybersecurity Webinar

Topics From patches to passwords, vulnerabilities to who is vulnerable, listen in to Jason Rebholz (Corvus Insurance), Conor Quinlan (Airiam), and Art Ocain (Airiam) talk about how companies can best protect themselves. October is Cybersecurity Awarene
Avatar photo
Bill Bowman
>>Read More