Search
Close this search box.

Podcast: Your Flight Plan for Ransomware Recovery

Avatar photo
Bill Bowman

Episode Summary

Aviation and cybersecurity are two passions for Jim Aldridge. Jim is a practical cyber risk management professional and the Vice President for Partnerships at MOXFIVE. He has been in cybersecurity for over 20 years.

Jim flying over scenic landscapes while he monitors the controls.

On the surface, the domains are quite distinct. Digging a bit deeper, there are parallels to draw between flying a plane and successfully preparing for and responding to cybersecurity incidents. Jim joined Art Ocain on the podcast to discuss the topic. Similarities discussed include:

  • Complexity: Like IT systems, planes and aviation are complex topics that have many nuances. There are massive amounts of systems that need to work in unison.
  • Risk Management: Risk cannot be eliminated. There is risk involved when flying across the country. There is a risk to making bold business moves and using new IT technology. Being aware of the risk and managing it are the key parts.
  • Collaboration: A single person or company cannot do it all. In aviation, there are specialists in the different parts of the aircraft. The same company that fuels the plane likely does not perform maintenance on the engines. In cybersecurity and incident response, relying on the right partner in the right realm results in better outcomes. The roles and responsibilities are known to all involved as well.
  • Tracking and Processes: A repeatable framework for execution helps organize the incident response and reduces chaos. Checklists of tasks to perform and systems to check are important in both domains. Centralized tracking also gives visibility for the entire team involves.

Jim showcasing a MOXFIVE sticker as he flies 4,000 feet above southeastern New York.

The ransomware recovery flight plan shared has elements of prevention, response, and resilience:

  • Implement endpoint detection and response (EDR).
  • Setup and require multi-factor authentication (MFA) for employees.
  • Backup your systems and test the backup recovery process in a dedicated exercise.
  • Build defense-in-depth to reduce the chance of new threat actor techniques to succeed.

Video Version

Listen to more episodes at www.airiam.com/podcast, on Spotify, Apple Podcasts, Google Podcasts, Amazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Multi-Factor Authentication (MFA) Keeps the Cybergoblins Away

Here’s a cybersecurity trick or treat for you. It’s Halloween. You hear the doorbell ring. Would you answer your door without looking to see who’s on the other side? Would you leave your door unlocked, knowing the night will be filled with strangers lo
Avatar photo
Andrew Betts
>>Read More

What Is a Managed Service Provider (MSP): Examples & Benefits

You’ve likely heard the terms MSP and managed IT floating around the internet—but what is a managed service provider, and is it something you need? We’ve got you covered. Below, we’ll walk you through everything you need to know about managed service p
Jesse Sumrak
>>Read More

Podcast: A Story of Resilience from Airiam’s Alex Zelenskiy

 Episode Summary Since Russia attacked Ukraine in February 2022, the war has upended the lives of millions and resulted in the tragic loss of many lives. Amidst the chaos and destruction, there are stories of resilience and goodness. Airiam’s Alex Zel
Avatar photo
Bill Bowman
>>Read More