Rebuild Your Business After an Attack: Threat Actors Webinar

Vivian Lee

Rebuild Your Business: Webinar Summary

Airiam and MOXFIVE wrapped up the second of our Threat Actors webinar series! Art Ocain and Ben Hartwick were great hosts walking us through a ton of information on how to rebuild your business after an attack.

Systematic Approach

From incident scoping to determining if your backups are valid, making sure there is a system in place is the fastest way to rebuild your business. It all starts with incident scoping, a crucial step in understanding the extent of the breach. Then, rally the tech troops and align your teams for a coordinated kick-off, ensuring everyone is on the same page. One pivotal question to address is whether your organization has an incident response plan in place. Unfortunately, many businesses do not. Having a well-defined plan greatly streamlines the recovery process. Lastly, check if your backups are valid; they are often your lifeline in restoring critical data and systems. In summary, following these systematic steps is the fastest and most effective way to rebuild your business in the aftermath of a cyber attack.

Restoration

Moving onto restoration, there are a few steps you should take to recover your business. Art and Ben break it down to the steps below:

  • Determine all assets in the environment
  • Prioritize those assets
  • Restore critical systems
  • Restore remainder of devices

Prompt Activation of Incident Response Plan

To ensure your incident response plan is enabled quickly and effectively, it’s important to review these steps with your team BEFORE anything happens. Once the activation occurs, your business should:

  • Determine specific roles for the team
  • Ensure communication timing with teams
  • Establish war room or standing cadence
  • Technical calls
  • Exec overview calls

After Restoring

Once your business has been restored, you should not stop moving.

  • Ensure tools are in place to continually protect environment
  • Start up some end user training to prevent future occurrences
  • Review the lessons learned from the initial attack and/or from the process of rebuilding
  • Focus on building your business’s resiliency for the future

Register for More Webinars

Register for our next webinars! Airiam is hosting our next series of webinars in collaboration with our partners! Each partner will help us walk through 4 key moments of a threat actor attack. Next up is “How to Prepare Your Company for Future Attacks” with ThreatLocker.

DATE TOPIC PARTNER REGISTER
July 19, 11AM EST Live Attack Simulation Watch Here
August 29, 12PM EST How to Defend Your Company During an Attack Watch Here
September 19, 12PM EST How to Rebuild Your Company After an Attack Watch Here
October 11, 11AM EST How to Prepare Your Company for Future Attacks Register Here

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

Podcast: MITRE for Everyday Organizations

Episode Summary MITRE’s Shane Steiger, Esq., CISSP is our guest again in this episode, a continuation from the previous. Shane covers more about what cyber resiliency is and how it relates to cybersecurity. He also shares his advice for small-to-medium
Avatar photo
Conor Quinlan
>>Read More

Immutable Backups: What It Is, How It Works, & Getting Started

Immutable backups are the modern-day answer to skyrocketing cybercrime. Cyber attacks continue to grow year after year, leading them to become the greatest transfer of economic wealth in history. A single ransomware attack costs an average of $1.85 mil
Jesse Sumrak
>>Read More

Frosty the Firewall: Building a Strong Defense

Frosty the Snowman was a fairytale they say, but cyber threats and threat actors are very, very real. Our digital defense systems might need a touch of magic to ward off the evolving dangers  in the cyber realm. Building a robust firewall, alongside ot
Vivian Lee
>>Read More