Cyber Incident Response and Planning Best of GSX 2024 Conference Recording
3.5 CPE
3.5 CPE
This Best of GSX package features 4 recordings where you'll learn how an university defeated a devastating ransomware attack in real-time, uncovering the precise strategies and tools that thwarted the adversaries. Dive deeper into the art of incident response planning and simulation, learning how to prepare for and mitigate the chaos that can follow a cyber crisis. Uncover the secrets of building effective phishing pretexts that lure unsuspecting users, and explore the critical steps to prioritize data protection before the next breach strikes.
This package includes:
Defeating Ransomware in Real Time
How did a small Midwest university with no security budget not only survive but thrive after a ransomware event? The theme of this presentation includes all of the steps we took to defeat the adversaries including a listing of all tools and activities that interrupted a ransomware event as it occurred.
The purpose is to provide the audience with:
- Prevention activities (prior to breach)
- A detailing of real time events as they unfolded, including our successes and failures
- How we worked with cyber insurance, forensics teams and internal IT
- Remediation and reconstitution efforts: lessons learned
- 2024 status—how the university is thriving
Preparing for Your Worst Day: Cyber Incident Response Planning and Simulation
Cyber is now an established element in the security continuum, and the threat of a cyber incident brings together concerns of people, property, and process that are key to an organization's mission and ongoing survival. Preparing for a cyber incident and knowing how your organization will, or will not, be able to respond is therefore crucial to the overall process of risk assessment and management. This session will explore proven strategies to best prepare for a cyber incident, and how to mitigate the organizational chaos that can follow. It includes real-life examples of current cyber threats and identifies practical steps an organization can take to reduce the resulting risk.
Here's My Password—Building Effective Phishing Pretexts
For most of us, we can spot a phishing or scam email from a mile away, right? Well, sometimes it’s not so easy. The sender is legitimate looking, the request and scenario in the email is reasonable, and the branding is the same as companies we deal with. The only catch is that none of that was true. This talk discusses how to build effective phishing pretexts and landing pages that are almost guaranteed to get user engagement and credentials.
Steps to Prioritize Data Protection Before the Next Breach
Data defined as sensitive or critical isn't always the most useful to bad actors, yet where do we put our controls? While common, data breaches aren't always about identity theft, phishing, or even monetary gain, and often don't target organizationally defined sensitive data. There are many cases of data theft crossing into surveillance/stalking, non-monetary gain, and other less publicized uses. In this presentation we will examine the attention and controls organizations give to physical, cloud, network, and end point security contrasted against the same for data security. We will discuss why with so many controls in place, data breaches continue to increase in frequency, volume, or both depending on the year or region.
3.5 CPE