Podcast: In the Ransomware Recovery Trenches

Avatar photo
Bill Bowman

Episode Summary

The impact of ransomware on organizations is well-known. Companies can be coerced into making ransom payments. The business itself could be forced to close. Sensitive customer data can be leaked onto the Dark Web. An impacted organization’s IT environment may have to be rebuilt from scratch. The impact of ransomware to the employees of the impacted organization is not as well known or discussed.

Tony Kirtley is the Director of Cyber Risk Partnerships at Secureworks. He joins the episode to discuss what it is like on the ground when ransomware strikes and employees attempt to recover the environment. Airiam Field CISO/CIO Art Ocain also shares his first-hand experience in the episode. They both recall the extreme emotions that accompany ransomware response. Responsible people at the victim organization can suffer health impacts and hospitalizations from the experience. To get the best outcome from a response engagement, they recommend responders:

  • Set and communicate realistic expectations regarding timelines with senior leadership and board members.
  • Keep calm despite the stressful situation. The impacted organization is often under significant stress. A calm presence helps the team.
  • Work with the right partner who is a master of their domain of expertise. In the case or Secureworks and Airiam, Secureworks deploys their Taegis XDR while Airiam performs “hands-on-keyboard” rebuilding activities as part of the AirRescue™ offering.

Reducing the likelihood of ransomware in the first place is also important. Tony and Art shared some tips for that as well, including:

  • Develop an incident response plan with primaries and backups for each role. The contacts must be aware of the role responsibilities.
  • Patch your systems when updates are available. Tony noted that vulnerabilities were the most common attack vector in a recent report.
  • Get visibility into endpoints using endpoint detection and response software.
  • Diligently understand and configure Active Directory (AD) and the security features it has built in. In 100% of the incidents that Tony has worked on, domain admin access was achieved to deploy ransomware at scale.

In the end, Tony’s takeaway is that companies don’t need to build a massive fortress. IT leaders at organizations need the visibility into their environment and strong walls safeguarding their important assets.

Video Version

Listen to more episodes at www.airiam.com/podcast, on Spotify, Apple Podcasts, Google Podcasts, Amazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Stopping Server Sprawl In Transportation & Logistics

THE STORY This coming weekend, we will be virtualizing the datacenter for a popular trucking and logistics company. This virtualization project will reduce capital expenditures on hardware by consolidating workloads to fewer physical servers. This mean
Avatar photo
Steven Brown
>>Read More

Airiam Hires Alan Villaseñor to Build and Manage SOC

Airiam, a managed IT and cybersecurity company with a deep focus and expertise on ransomware recovery, cyber resilience, and immutable backups today announced Alan Villaseñor will lead the company’s security operation center (SOC). Villaseñor holds CIS
Avatar photo
Bill Bowman
>>Read More

Types of Hackers

What are Hackers? Hackers, individuals with advanced computer skills, gain access to systems, networks, or data. Despite diverse personas, often associated with malicious intent, the hacker landscape features intricate classifications. Ethical defender