
Sign up to save your podcasts
Or


The use of data has been the biggest source of growth in companies and has become the biggest source of risk. When our data is compromised and held hostage, how do we get that data back? Are the negotiations similar to a "typical" hostage negotiation?
After 33 years with the Canadian Federal Police in the area of kidnaps and extortions, Cal Chrustie retired from the police force and transitioned to InterVentis global. He now works with a group of negotiators from around the world to provide education, consulting, and coaching on cyber terror incidents. In this episode of Negotiations Ninja, Cal shares what the cyber terrorism negotiation process looks like. Don't miss it!
Outline of This EpisodeSubscribe to Negotiations Ninja
By Mark Raffan4.7
120120 ratings
The use of data has been the biggest source of growth in companies and has become the biggest source of risk. When our data is compromised and held hostage, how do we get that data back? Are the negotiations similar to a "typical" hostage negotiation?
After 33 years with the Canadian Federal Police in the area of kidnaps and extortions, Cal Chrustie retired from the police force and transitioned to InterVentis global. He now works with a group of negotiators from around the world to provide education, consulting, and coaching on cyber terror incidents. In this episode of Negotiations Ninja, Cal shares what the cyber terrorism negotiation process looks like. Don't miss it!
Outline of This EpisodeSubscribe to Negotiations Ninja

228,126 Listeners

16,768 Listeners

1,457 Listeners

702 Listeners

57 Listeners

360 Listeners

56,375 Listeners

8,618 Listeners

71 Listeners

2,115 Listeners

47 Listeners

20,308 Listeners

10 Listeners

8,388 Listeners