
Sign up to save your podcasts
Or
For the video of this podcast: After an Attack: Cyber Recovery Best Practices for State & Local Agencies.
Follow FedInsider on LinkedIn
Mike Tyson’s famous quote, “Everyone has a plan until they get punched in the face,” is a fitting analogy for the unpredictability and impact of a cyber-attack.
In this week’s Feds At The Edge podcast, we have a brutally honest conversation about a topic nobody wants to address: the step-by-step process of recovery from a cyber-attack.
We explore the importance of isolating the hypervisor to establish secure virtual domains and firewalls after an attack with Solomon Adote, Chief Security Officer with the Delaware Department of Technology and Information.
James Thurmond, Deputy CISO with Los Angeles County, introduces the concept of an emergency “break glass” account, that provides systems administrators with a reliable starting point for recovery. And Danny Page, Inside Sales Engineer from Rubrik, stresses understanding the full scope of an attack, including unnoticed data exfiltration, for effective recovery.
Detailed playbooks created from tabletop exercises should include contact information, an accurate inventory of all assets, and specific action steps to follow during an attack.
Tune in on your favorite podcasting platform to hear our experts discuss how balancing prevention and recovery skills is essential for managing sensitive data systems.
5
55 ratings
For the video of this podcast: After an Attack: Cyber Recovery Best Practices for State & Local Agencies.
Follow FedInsider on LinkedIn
Mike Tyson’s famous quote, “Everyone has a plan until they get punched in the face,” is a fitting analogy for the unpredictability and impact of a cyber-attack.
In this week’s Feds At The Edge podcast, we have a brutally honest conversation about a topic nobody wants to address: the step-by-step process of recovery from a cyber-attack.
We explore the importance of isolating the hypervisor to establish secure virtual domains and firewalls after an attack with Solomon Adote, Chief Security Officer with the Delaware Department of Technology and Information.
James Thurmond, Deputy CISO with Los Angeles County, introduces the concept of an emergency “break glass” account, that provides systems administrators with a reliable starting point for recovery. And Danny Page, Inside Sales Engineer from Rubrik, stresses understanding the full scope of an attack, including unnoticed data exfiltration, for effective recovery.
Detailed playbooks created from tabletop exercises should include contact information, an accurate inventory of all assets, and specific action steps to follow during an attack.
Tune in on your favorite podcasting platform to hear our experts discuss how balancing prevention and recovery skills is essential for managing sensitive data systems.