In this SecureWorld podcast, Shawn Tuma teaches about the ransomware attack lifecycle and complex incident response process with real-life examples and best practices. Listen Here: Podcast Page: https://www.secureworldexpo.com/resources/podcast-ransomware-attack-lifecycle Podcast Direct Link: https://html5-player.libsyn.com/embed/episode/id/18149138/height/90/theme/custom/thumbnail/yes/direction/backward/render-playlist/no/custom-color/000000/ Link to slides: https://www.slideshare.net/shawnetuma/lifecycle-responding-to-a-ransomware-attack-a-professional-breach-guides-perspective/shawnetuma/lifecycle-responding-to-a-ransomware-attack-a-professional-breach-guides-perspective Tell us what you think about it on LinkedIn here: https://html5-player.libsyn.com/embed/episode/id/18149138/height/90/theme/custom/thumbnail/yes/direction/backward/render-playlist/no/custom-color/000000/
Tag: Cybersecurity
Shawn Tuma Included in “Raise the Cybersecurity Curtain – Cybersecurity Leaders Quotes”
I am deeply honored to have been included in Raise the Cybersecurity Curtain – Cybersecurity Leaders Quotes. Here is my quote from page 7 of the publication: There is no such thing as being “secure.” There are always vulnerabilities that could have been found or remediated. There are always more things that a business could…
Working From Home During COVID-19? Five Things You Should be Doing–But Probably Are Not–To Be More Cyber Secure (publication)
Many thanks to the Texas Bar Journal for publishing my recent article, Working From Home During COVID-19? Five Things You Should be Doing–But Probably Are Not–To Be More Cyber Secure, in the Cybersecurity Issue: Without an understanding of the particular organization or the unique risks it faces, it is impossible to know what is best or…
We need more humility in cybersecurity
We need more humility in cybersecurity. Let me explain … I was scrolling through LinkedIn and came across a comment on a post about FireEye from my friend Raf Los that reminded me of this issue and a webinar I did with SecureWorld several months back. In the webinar, I was asked what is the…
The Art of Cybersecurity: How Sun Tzu Masterminded the FireEye / US Agencies / SolarWinds Cyberattacks
Sun Tzu taught that, when it comes to the art of cybersecurity, you must be wary of your business partners and other third parties. Why? Unless you are living under a rock, you should have heard that FireEye–perhaps the preeminent cybersecurity firm on the face of the planet–was the victim of a successful cyberattack. So…
***URGENT*** MEMO TO: “The IT Guy” RE: Securing RDP Access–Changing the RDP Port Does Not Work!
***URGENT MEMORANDUM*** TO: “The IT Guy” FROM: Your clients’ Incident Response Coach SUBJECT: Securing RDP Access–Changing the RDP Port Does Not Work! This Memo comes out of necessity, please take it seriously. I have now lost track of how many times over the past couple of months I have been on “scoping calls” with a…
Think your company is too sophisticated to be hit with a successful cyber attack? Ask FireEye …
A lot of business executives — and far too many IT professionals — think that their company’s IT systems are too sophisticated and well-maintained for their company to have a successful cyberattack against it. They think their company is doing it all right and this is only the kind of stuff that happens to “the…
2 Critical Cyber Insurance Issues All Companies Must Consider Now, Before an Incident!
There are two critical cyber insurance issues that every single company must understand right now, before they have an incident: In today’s environment, every company has substantial cyber risk and every company needs cyber insurance. Period. Cyber insurance is not covered by typical business insurance and companies must have the right cyber insurance for their…
Simple Mistakes – Not Always “The Hackers” – Can Cause Substantial Data Breaches
It is not always the feared and dreaded “hackers” that cause the exposure and breach of confidentiality of sensitive personal information. Sometimes it’s just simple mistakes, but the consequences can be much the same. Consider this situation: NTreatment inadvertently exposed thousands of medical records online by neglecting to add password protection to one of its…
Think your company is too sophisticated to be hit with a ransomware attack? Ask Advantech …
A lot of business executives — and far too many IT professionals — think that their company’s IT systems are too sophisticated and well-maintained for their company to have a successful ransomware attack against it. They think their company is doing it all right and this is only the kind of stuff that happens to…
You must be logged in to post a comment.