Dec. 22, 2025

Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber Insurance

Building Your Cyber Security Team: Blue Teams, Red Teams, and Cyber Insurance

Building a cyber security team isn't optional anymore; it's the difference between recovering from ransomware and going out of business. In this episode, Curtis and Prasanna explain why hardening your backup infrastructure is only half the battle. You need professionals who know how to configure XDR systems without drowning you in false positives, blue teams to defend your environment, and red teams to test whether your defenses actually work. They cover the role of MSSPs, incident response planning, cyber insurance requirements, and why attempting ransomware response on your own is like those old TV warnings: "Don't try this at home." If you've been following their series on backup basics and system hardening, this episode ties it all together with the human element that makes or breaks your recovery plan.

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we're talking about how you can't do this alone.

Speaker:

We've been talking the last few episodes, you know, about, uh, hardening your

Speaker:

backup systems against ransomware.

Speaker:

But remember that much of that tech is only as good as

Speaker:

the team that configured it.

Speaker:

This is why Prasanna and I will talk about how you need professionals on your side.

Speaker:

Uh, we talk about blue teams and red teams, what they actually do, how

Speaker:

cyber insurance fits into all of this.

Speaker:

Let's talk about building your cybersecurity team.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup, and I've been passionate about backup and recovery for

Speaker:

over 30 years, ever since.

Speaker:

I had to tell my boss that there were no backups.

Speaker:

Of the production database that we had just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated backup admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

Welcome to the show.

Speaker:

Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy

Speaker:

whose hair I'm continually jealous of.

Speaker:

Prasanna Malaiyandi, how's it going?

Speaker:

Prasanna,

Speaker:

I'm good.

Speaker:

Curtis, come on.

Speaker:

What's there to be jealous of?

Speaker:

you know what's there, and I'm telling you that long.

Speaker:

You know what, what, what does Steven call you?

Speaker:

Goldilocks.

Speaker:

Oh.

Speaker:

Um, yeah, so, uh, what are we talking about today?

Speaker:

Today we are talking about more about or more details about a previous episode

Speaker:

where we covered sort of 10 things you should be aware of to make your backup

Speaker:

or for your backup infrastructure

Speaker:

Yeah, the, it started with the 10 basic things.

Speaker:

These were like table stakes.

Speaker:

Like if you don't have these things.

Speaker:

Don't even tell me you have a backup system.

Speaker:

Right.

Speaker:

'cause you don't.

Speaker:

Right.

Speaker:

Um,

Speaker:

me you don't have, you have a backup.

Speaker:

yeah.

Speaker:

Yeah.

Speaker:

I'm telling you.

Speaker:

Right.

Speaker:

Um, and then we, and then we, um, you know, we got some, uh, some

Speaker:

critique on that, like suggesting we had left things out and.

Speaker:

I, I don't think we did.

Speaker:

I just think that, um, these were like literally table stakes.

Speaker:

Like if you don't, if you don't conform to the 3, 2, 1 rule, like, uh, you

Speaker:

don't actually have backups, right?

Speaker:

If you're not, if you're not scheduling them, if you're not managing them,

Speaker:

if you're not monitoring them.

Speaker:

Like these are basic everyday things that you need to have in your backup system.

Speaker:

But then the last episode, we, um, talked about hardening that backup system, right?

Speaker:

And, um, we talked about, um.

Speaker:

Uh, you know, some sort of modern password management system, right?

Speaker:

We talked about MFA or pass keys.

Speaker:

We talked about disabling or severely restricting RDP, otherwise known as

Speaker:

the ransomware deployment protocol.

Speaker:

protocol.

Speaker:

whatever, uh, allegedly.

Speaker:

And we talked about role-based access controls.

Speaker:

Uh, and um, and then finally we talked about potentially considering using

Speaker:

a service provider of some sort, everything from a service provider

Speaker:

to help manage and make your current system, uh, you know, more secure

Speaker:

to actually going with, uh, a full.

Speaker:

Uh, a fully SaaS based data protection system where they're

Speaker:

responsible for the security.

Speaker:

one thing that popped to mind since the last episode,

Speaker:

Yeah.

Speaker:

I wonder if you went, because Claude and OpenAI chat GT and everything else, right?

Speaker:

They're getting all powerful

Speaker:

and very useful.

Speaker:

I wonder if anyone's actually tried to be like, Hey, here's my backup system.

Speaker:

Tell me what I need to do to secure this.

Speaker:

Yeah.

Speaker:

You know, that would be interesting.

Speaker:

Claude.

Speaker:

Claude is pretty dang smart.

Speaker:

I use Claude quite a bit, right.

Speaker:

I'm literally reading right off of Claude right now.

Speaker:

I use Claude quite a bit.

Speaker:

I and Claude is pretty knowledgeable, not perfect.

Speaker:

You, you, you have to verify like when you're gonna use it to.

Speaker:

Make recommendations for your life.

Speaker:

Like

Speaker:

it definitely hallucinates, right?

Speaker:

Um, but it, it's pretty decent in terms of discussing backup, um,

Speaker:

infrastructure, uh, with it, right?

Speaker:

Um, backup security and, uh, suggestions and things like that.

Speaker:

I, I think that's actually a really interesting idea.

Speaker:

I like that.

Speaker:

Um, so.

Speaker:

The, the next phase here is that, alright, so you, you've,

Speaker:

you've, you've got the 10 things.

Speaker:

You've hardened your backup system in order to, uh, one

Speaker:

of which is immutable backups.

Speaker:

Immutable backups.

Speaker:

Immutable backups.

Speaker:

Right?

Speaker:

So that was really what the last one was about, was, you know, I, I

Speaker:

said in the, in the 10 things, one of the 10 things was you need to

Speaker:

have an immutable backup system.

Speaker:

And then the last time we talked about just basically continuing

Speaker:

to harden that system so that.

Speaker:

No matter what happens, you will have a copy of your data

Speaker:

that you can use to restore.

Speaker:

So now let's talk about what we can do to prepare to be able to use that system.

Speaker:

Right?

Speaker:

is it even to just prepare for what could eventually happen and make

Speaker:

sure, is your system truly immutable?

Speaker:

Yeah.

Speaker:

Uh, no, no, I don't, I don't know what

Speaker:

Yeah, because blue teaming and red teaming,

Speaker:

Yeah.

Speaker:

Okay.

Speaker:

Alright.

Speaker:

Alright.

Speaker:

Um, yeah, that's, yeah, that is true.

Speaker:

At least one of these things is, is, is a way to ensure that the things you did.

Speaker:

The last episode are, uh, actually work.

Speaker:

So the first thing that I wanna talk about, one could, you know, we just

Speaker:

finished, um, I literally got yesterday, I dunno if I told you this, but yesterday

Speaker:

evening I was sent the, uh, the QC one, which is the quality control

Speaker:

one copy of, uh, learning ransomware, um, response and recovery, right?

Speaker:

Which

Speaker:

Which is, your new

Speaker:

Which is my new book with, uh, uh, Dr. Mike Saylor, uh,

Speaker:

friend of the pod, obviously.

Speaker:

Uh, and one of the consistent things that I got was that.

Speaker:

I think that to a certain degree you can harden your backup system without

Speaker:

a ton of professional, uh, help, right?

Speaker:

Meaning that you can just make sure you, you go with certain vendors and

Speaker:

certain features, make sure that you have those features immutability,

Speaker:

real immutability being one of them.

Speaker:

But the more I worked with Mike on.

Speaker:

Actually when we need to use the system, and not just a backup system, but our

Speaker:

overall IT system and security system to actually respond to a ransomware attack,

Speaker:

the more I began to develop the feeling that this is really not something that you

Speaker:

should be trying to attempt on your own.

Speaker:

This is what, what were those old.

Speaker:

The, you know, the, the events on this show are done by a professional sunriver.

Speaker:

Oh yeah,

Speaker:

Please do not, attempt them at home.

Speaker:

Right.

Speaker:

Uh, I don't remember what that was from, but that's where I, and so when

Speaker:

we talk about getting a, a company to help you to do this, what term

Speaker:

do we use to refer to that company?

Speaker:

So normally we call them the blue team.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

We're gonna talk about it the other team in a, in a minute.

Speaker:

Right?

Speaker:

But I really think that.

Speaker:

Before you need one, it's time to contract a blue team.

Speaker:

Right?

Speaker:

So they can go through the checklist that we talked about, uh, everything that we

Speaker:

just talked about in, in the previous episodes of making sure that your,

Speaker:

your backup system is, is functional.

Speaker:

I do think someone like me, I'm not the only one out there, but someone like me.

Speaker:

Who is backup system security specific?

Speaker:

Uh, there are things about your backup system that only a backup expert will

Speaker:

be able to help you, uh, look for, but then to take the overall security of

Speaker:

your entire environment and make sure that you have the, the defensive tools.

Speaker:

Tools like XDR, SIEM, SOAR tools.

Speaker:

Right.

Speaker:

Um, to have those things in place.

Speaker:

And then let me ask you a question Prasanna.

Speaker:

What good is an improperly configured XDR system?

Speaker:

Uh, you might as well not have one.

Speaker:

Exactly right.

Speaker:

Um, I would say the biggest issue with an improperly configured XDR

Speaker:

system will be, uh, false positives.

Speaker:

Yeah, why?

Speaker:

Why, why is that a problem?

Speaker:

Why is that worse than not having one at all?

Speaker:

Yeah, because what'll happen is you'll keep getting all these

Speaker:

alerts and then you'll be like, oh, I'm just gonna turn it off.

Speaker:

And then you just shut down the entire system, which means you

Speaker:

might as well not have had anything

Speaker:

Yeah.

Speaker:

Your, your, your alerting system basically becomes Henny Penny.

Speaker:

Do you know who Henny Penny is?

Speaker:

I was gonna say the boy who cried wolf, but

Speaker:

Henny Penney's the story of the person who kept saying the sky is falling.

Speaker:

Oh

Speaker:

Um, and uh, then when this guy actually was falling, nobody, nobody believed him.

Speaker:

Same thing, I think with the boy who cried Wolf.

Speaker:

Yeah.

Speaker:

Um,

Speaker:

the, the, so I know you talked about tools

Speaker:

like the Blue team can help you with

Speaker:

that, I think, and we'll maybe cover this in more detail a bit later,

Speaker:

but in addition to tools, they can also help you around processes

Speaker:

and other things

Speaker:

yes,

Speaker:

yes, Because you know, people, process and technology, right?

Speaker:

Technology is the last one, right?

Speaker:

Because if you, if you don't have those processes down, what

Speaker:

will we do when we get alert?

Speaker:

What will we do when we get.

Speaker:

When there's something that is suggested that, um, you know, that it looks like

Speaker:

we've got some sort of actual attack, what do we do when we have a new system?

Speaker:

What do we do when we have a new person?

Speaker:

What is our onboarding procedure?

Speaker:

What is our offboarding procedure?

Speaker:

There are.

Speaker:

Uh, um, security reasons to look into that.

Speaker:

There are legal reasons to look into that, right?

Speaker:

What is your offboarding process?

Speaker:

So, um, yeah.

Speaker:

And they can help you with all of that.

Speaker:

Help you develop your runbooks, uh, to, to make sure that you have the procedures

Speaker:

and your playbooks to go into the individual, um, procedures so a blue team

Speaker:

can come in a couple of different flavors.

Speaker:

You can have sort of a one time, which I think would be a really, again,

Speaker:

better than nothing, but security is kind of like backup, is it?

Speaker:

If you just do the one time thing, uh, it's very easily for that, for

Speaker:

the configuration to waver over time and for you to be less secure than

Speaker:

you were, uh, at that magical moment.

Speaker:

Right?

Speaker:

Or the people and processes change over time and

Speaker:

now you're, you have gaps.

Speaker:

Yeah.

Speaker:

Your processes change as your company changes, as the, what you do for a company

Speaker:

or, you know, what you do for a business.

Speaker:

Uh, changes.

Speaker:

I actually think back to, uh, there was this company, um, I'll just say it was

Speaker:

a, it was a company that made things.

Speaker:

They actually.

Speaker:

If I said what they actually were like, there's like one company that's like

Speaker:

this, that it, it would really, but they, they actually made something, a physical

Speaker:

thing that you may have actually had in your house and they were using, um.

Speaker:

The, you go back, this is again, this is gonna date this story of course, but

Speaker:

you remember BCVs, you remember EMC and BCVs, and then there were off host backups

Speaker:

using like, so if, if you had, at this time it was net backup, and you could

Speaker:

actually, you could split the BCV, which was a business continuance volume, and

Speaker:

then you could back that up directly, uh, and, and so you could back up your volume

Speaker:

both like offline and, well, not offline, but disconnected from the primary system

Speaker:

and in a way that didn't affect the, the performance of the primary system.

Speaker:

It was a really cool thing back in the day, but it was complicated and I

Speaker:

had it configured and it was amazing.

Speaker:

And then I left and like a month later it didn't work anymore.

Speaker:

And they were like, he didn't configure it right.

Speaker:

I'm like, I'm sorry, but I have videos of it actually, uh, working.

Speaker:

So, yeah.

Speaker:

So I do think that what you should be doing is having a regular relationship

Speaker:

with an MSSP who can help you, if nothing else, just regularly look at

Speaker:

what you are doing and make sure that you're doing things in the, the most

Speaker:

secure way that your budget can afford.

Speaker:

Can you define what an MSSP is for people?

Speaker:

we did that already, but I will do that again.

Speaker:

Managed security service provider.

Speaker:

Right.

Speaker:

And again, uh, you know, this is sound like I'm shilling from a friend

Speaker:

there, from my co-author, but, you know, like black Swan Cybersecurity,

Speaker:

which is, uh, Mike Saylor's company.

Speaker:

So, um.

Speaker:

I think that's you need, even if all you do is create the relationship

Speaker:

now, vet your vendors now so that when you get attacked, and I'm

Speaker:

gonna say when you get attacked, you can then just call them in, right?

Speaker:

You, you get a $0 purchase order.

Speaker:

All of those things.

Speaker:

So that you could just call them.

Speaker:

But definitely what's better is to have them, um, you know, part

Speaker:

of the, the day-to-day routine.

Speaker:

And also, especially if you're a smaller company, they could potentially bring

Speaker:

in, they probably have volume pricing with things like XDR tools and SIEM/SOAR

Speaker:

tools, uh, by the way, so that's, uh, extended detection and response, SIM is

Speaker:

security information and event management.

Speaker:

A SOAR tool, a security orchestration and response, right?

Speaker:

Um, and they potentially have, they most certainly have volume discounts

Speaker:

with tools that they know, they know how to use, they know how to configure

Speaker:

it properly, and you could potentially get a good tool through them, properly

Speaker:

configured for less money than you could potentially go buy a very similar

Speaker:

tool, uh, and improperly configure it.

Speaker:

So, yeah, so big fan of getting an MSSP, uh, to, uh, to learn how to

Speaker:

defend against, a ransomware attack.

Speaker:

And going back to sort of the people and process, so you just touched on the tools.

Speaker:

One of the things MSSPs also bring to the table.

Speaker:

No pun intended is tabletop exercises.

Speaker:

Right.

Speaker:

And Curtis, do you wanna talk about a little about what a tabletop exercise is?

Speaker:

Yeah.

Speaker:

So basically we literally sit around a table and we define a scenario, right?

Speaker:

You know, of like, you know, you just, you just got, um, you know, you just

Speaker:

got attacked by this kind of ransomware.

Speaker:

This system did this, this system did this.

Speaker:

Now what do you do?

Speaker:

And, oh, by the way, Curtis got hit by a bus.

Speaker:

So Curtis isn't available.

Speaker:

What do you do?

Speaker:

Right?

Speaker:

And because your, your, uh, your runbooks and playbooks need to have

Speaker:

all of these scenarios in there.

Speaker:

Good.

Speaker:

I think a good, uh, MSSP will be good at coming up with these

Speaker:

scenarios because they've been in the middle of those scenarios.

Speaker:

Mm-hmm.

Speaker:

Yep.

Speaker:

Yeah,

Speaker:

they're down in the trenches

Speaker:

and they understand what these look like.

Speaker:

Yeah.

Speaker:

And, and a good, uh, I think a good tabletop should be fun, should

Speaker:

not be, uh, the degree to which sometimes a DR test can be not so fun.

Speaker:

Right.

Speaker:

This is something you could do much more often.

Speaker:

You by creating, we, we talk about creating an environment or

Speaker:

a culture of, of recovery, right?

Speaker:

And so this is something so that you keep cybersecurity and ransomware

Speaker:

protection, uh, front of mind, right?

Speaker:

And closely related to tabletops is actually the next

Speaker:

level, which is an actual.

Speaker:

Recovery test.

Speaker:

Right.

Speaker:

How, how is that different than, than the tabletop?

Speaker:

Well, because a tabletop, you're just sort of.

Speaker:

Talking through how you would go about addressing, say you got hit by

Speaker:

ransomware versus a DR test, you're actually doing some of these actions and

Speaker:

actually, uh, implementing and executing on your runbooks and playbooks to

Speaker:

make sure yes, when this thing happens, will it actually work?

Speaker:

It's like we talk about with restore testing, right?

Speaker:

It's, Hey, I created these runbooks playbooks.

Speaker:

Is it gonna work when I need it?

Speaker:

Yeah.

Speaker:

And, and you, you need to be, I, I think this is, I think this is possibly the best

Speaker:

argument for a cloud-based backup system because so many of them have this idea

Speaker:

of an automated, uh, disaster recovery.

Speaker:

Uh, process, right?

Speaker:

That you can literally push a button and fail over and, um, you just need to

Speaker:

pick your recovery point and fail over.

Speaker:

I, I will say that ransomware breaks a lot of that, right?

Speaker:

Breaks a lot of automation, but that doesn't mean we can't like, use

Speaker:

that for, for a ransomware attack.

Speaker:

But at the same time, I think you need to.

Speaker:

Remember that recovering data is just a small portion of the overall

Speaker:

ransomware recovery scenario, and

Speaker:

so

Speaker:

you need to make sure that yes, you might be able to fail over

Speaker:

and test your data recovery, but what about all the other things

Speaker:

? Yeah.

Speaker:

So much.

Speaker:

Right.

Speaker:

I'm glad you brought that up because, and, and, and I think this, to go

Speaker:

back to what I was just saying, right.

Speaker:

At least make sure that you know how to restore.

Speaker:

Right?

Speaker:

Right.

Speaker:

Make sure that your DR system works because it will be the easiest part, or it

Speaker:

should be the easiest part of recovering from a ransomware attack because it will

Speaker:

take days to weeks to months to isolate.

Speaker:

What actually needs to be restored, right?

Speaker:

This is where all of these tools and, you know, and, and different backup

Speaker:

systems have different capabilities here, uh, is to figure out what

Speaker:

actually needs to be restored.

Speaker:

So once you've done that, you should be able to just push a

Speaker:

button and restore that thing and bring that thing back online.

Speaker:

Um, and so I'm guess, so what I'm saying is it can't all

Speaker:

just be tabletop exercises.

Speaker:

We need to actually do recovery testing Now, I don't think.

Speaker:

I, I think this would be a great one to, to bring Mike on and talk about.

Speaker:

I think there is the concept of using in a isolated environment, actually introducing

Speaker:

real ransomware and seeing what it does that's like next level, right?

Speaker:

Um, but, uh, but it again.

Speaker:

The restore should be the easiest part.

Speaker:

So at least make sure that you have that down cold right?

Speaker:

Because you are a hundred percent right that,

Speaker:

um, it's gonna be the, well, it'll be the easiest part, right?

Speaker:

Uh, it's gonna take you a long time.

Speaker:

Well, and even for the restore piece, it's.

Speaker:

Right.

Speaker:

We've talked about this on the podcast before.

Speaker:

It's how do I know what is a good valid restore point that I can actually

Speaker:

recover from?

Speaker:

Yeah.

Speaker:

That, that's gonna be, that's gonna be your, uh, and we do, we

Speaker:

do talk about that in the book.

Speaker:

Um, but, uh, but like I said, once you decide what that is, you

Speaker:

should be able to push a button and magic should just happen.

Speaker:

So what about, uh, people that are gonna prove you wrong?

Speaker:

Oh yes.

Speaker:

So we talked about the blue team.

Speaker:

Right.

Speaker:

They're here, they're helping you, but you have this immutable backup system that's

Speaker:

been hardened, and you want to figure out how hardened is it and are there gaps?

Speaker:

And this is where you go and you hire a red team,

Speaker:

Yeah,

Speaker:

and these are people who are going to attack your system.

Speaker:

They're on your side, don't worry,

Speaker:

yeah.

Speaker:

right?

Speaker:

But they're gonna look for flaws.

Speaker:

It kind of reminds me of white collar where Peter hire hires Neil

Speaker:

Caffrey.

Speaker:

Yep,

Speaker:

to kind of do the same sort of thing.

Speaker:

It's like, Hey, what are the vulnerabilities in the security

Speaker:

system or in this thing so we can identify, fix 'em

Speaker:

before the bad guys come.

Speaker:

Yeah, exactly.

Speaker:

It also reminds me of course of sneakers, right?

Speaker:

Which, if you haven't seen sneakers, go see sneakers.

Speaker:

That is really a red team that is specifically attacking cybersecurity.

Speaker:

I mean, some of the stuff in there is a little silly, but it

Speaker:

really goes into things like, um.

Speaker:

Uh, social engineering and things like that.

Speaker:

Right.

Speaker:

So, um, the, and we had Dwayne LaFlotte on here and, uh, hopefully

Speaker:

I can put a link down in the show description if you haven't listened

Speaker:

to that episode about Red Team.

Speaker:

And do you remember what he said about backup systems?

Speaker:

It's his favorite source to attack.

Speaker:

Yeah.

Speaker:

He is like, I love it when they have a good backup system.

Speaker:

Right.

Speaker:

Actually was so fascinated by that exchange that I actually

Speaker:

quoted it directly in the book.

Speaker:

I actually put it directly in the book.

Speaker:

And, um, yeah.

Speaker:

So a good red team, this is something that you use occasionally to, you

Speaker:

know, you think, you, you, you, you, blue team does the thing.

Speaker:

You've, you've hardened everything.

Speaker:

And then the red team goes and finds out, you know, they shows you that you put in

Speaker:

the wrong TV in your, um, in your lobby.

Speaker:

And then, uh, they used it to hack your environment.

Speaker:

Yep.

Speaker:

The things that you'd never think about.

Speaker:

Um, so yeah, so I, I, I do think the idea of red teaming your backup infrastructure,

Speaker:

I think is a really good idea.

Speaker:

And we are talking all about.

Speaker:

Process tools, right?

Speaker:

Um, we've also talked about, uh, red teams and blue teams, but all of these

Speaker:

things must be super expensive, and when you get hit by ransomware, your

Speaker:

bills are probably going to skyrocket.

Speaker:

So is there anything com organizations can do to sort of help 'em defer

Speaker:

or absorb some of these costs?

Speaker:

Yeah.

Speaker:

And, and that's really where cyber insurance comes into play, right?

Speaker:

If we go back in time, um, cyber insurance, well, this isn't that long ago.

Speaker:

This is like five years ago, right?

Speaker:

There was a time where the only role cyber insurance played was paying the ransom.

Speaker:

You're seeing that becoming less and less the case and that the role that the

Speaker:

cyber insurance company is playing is basically part of your blue team, right?

Speaker:

They're helping you to build the defenses.

Speaker:

They're giving you a checklist of things that you're going down to

Speaker:

make sure that you are doing these things in order to be as resilient

Speaker:

against ransomware as you can.

Speaker:

Um, and yes, they, uh, are the company that then.

Speaker:

Funds, the, you know, the, you know, the, the actual process of hiring the,

Speaker:

the blue team to bring them in, right.

Speaker:

The incident response team, because that will be very expensive, right?

Speaker:

Um, and the incident response team, the, the blue team also, they're

Speaker:

going to know, and the re the, um, the cyber insurance people, uh, as

Speaker:

well are going to have access to, uh, essentially hostage negotiators, right?

Speaker:

Um, and so they, they actually, uh, what do you call it?

Speaker:

Um.

Speaker:

Negotiating with ransomware threat actors is a thing.

Speaker:

Right.

Speaker:

Um, and, uh, I mean, I still don't like the idea.

Speaker:

Right.

Speaker:

But depending on the scenario that you're in, you may have no

Speaker:

other choice either, uh, do the thing or, or go out of business.

Speaker:

Any, any thoughts on that?

Speaker:

you probably need to get cyber insurance if you don't have it already

Speaker:

today.

Speaker:

And then also make sure you are strictly abiding by the terms

Speaker:

of what's in there and that you are actually doing what you say you are doing.

Speaker:

Because the last thing you wanna do is pay insurance and then them finding

Speaker:

that, oh, you didn't do X, Y, and Z

Speaker:

and therefore now they're not paying out.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

That would be, that would not be a very good day.

Speaker:

Right.

Speaker:

Well, sort of a summary statement, the recurring theme in the book was

Speaker:

these things that you need to do and, and this goes back to the past

Speaker:

three episodes, including this one.

Speaker:

They're really easy, most of them, they're really easy to do.

Speaker:

Um, they might not be free.

Speaker:

Well, they, they won't be free, but they're not, there was nothing that

Speaker:

I recommended in the book that was like, oh my God, it is just gonna

Speaker:

be near impossible to do this right.

Speaker:

Near impossible.

Speaker:

I mean, possibly from a backup and recovery and

Speaker:

disaster recovery perspective.

Speaker:

Possibly the most difficult thing is, is some automated system.

Speaker:

To recover your data.

Speaker:

Right.

Speaker:

Um, we, we did cover in the book how that, I think that the better way to

Speaker:

do like a full scale restore because of how difficult it is to wipe.

Speaker:

Um, because it, it's very easy for the system, a system that you're

Speaker:

backing up to get infected before.

Speaker:

You know that it's infected, so restoring it from a backup from

Speaker:

yesterday will just reinfect it.

Speaker:

Right?

Speaker:

So as much as a fan, as I, as much of a fan as I am of backup, I, I think that

Speaker:

the idea of like re-imaging systems from a golden copy that you had from, you

Speaker:

know, the last time you reconfigured the OS at all, and then just restoring the

Speaker:

database, the applications, and the data.

Speaker:

Individually or separately from the backup system.

Speaker:

I, I think that's a much stronger, um, you know, thing.

Speaker:

And I think we could probably have an episode just on that.

Speaker:

Yeah.

Speaker:

And I agree it's probably stronger, but it may take significantly more time

Speaker:

Absolutely right.

Speaker:

There's no may about it.

Speaker:

It will take it, it's definitely a. I don't think it's a situation of

Speaker:

throw out the baby with the bathwater.

Speaker:

But it's definitely a significant change in infrastructure, right?

Speaker:

If you're not used to doing golden images, if you're not

Speaker:

used to doing that sort of thing.

Speaker:

And again, you need a process there because every time you update

Speaker:

the operating system, you need to update the golden image, right?

Speaker:

Um, and, but it, it's, it's another one of these things where

Speaker:

that, if you get good at that.

Speaker:

Um, again, you can just push a button, right?

Speaker:

Um, but it's, it's, it is totally doable.

Speaker:

But what I, where I was going with just a few minutes ago was that all

Speaker:

of these things are, they're doable.

Speaker:

They will definitely not be free, but they're doable with

Speaker:

time and effort and concern.

Speaker:

They all have to be done in advance,

Speaker:

Yes.

Speaker:

It, it does, it is like, one of the jokes I continually make is remember,

Speaker:

it doesn't matter when you invent a time machine, but it matters very much when

Speaker:

you implement a good backup system, when you implement a good cybersecurity system.

Speaker:

Right?

Speaker:

It, it doesn't, you know, it's sort of like, uh, you know, vaccines only work if

Speaker:

you take them before you get sick, right?

Speaker:

Uh, yeah.

Speaker:

Very

Speaker:

and just the one thing I wanted to add to that is you don't need to implement

Speaker:

everything we've talked about day one.

Speaker:

Good

Speaker:

You can, right?

Speaker:

We've been talking throughout this, these last three episodes.

Speaker:

Good, better, best, right?

Speaker:

You're on this journey to get to the best, right?

Speaker:

Or to better wherever,

Speaker:

based on cost and other things like that for your organization.

Speaker:

But you need to start somewhere, right?

Speaker:

So just start the journey.

Speaker:

You will eventually get there, and you'll be much better than where you are today.

Speaker:

Yeah, really good point.

Speaker:

Prasanna, it might take you a year.

Speaker:

It could take you longer than a year to get from where you're

Speaker:

at to where you want to be.

Speaker:

This is again, where I think professionals can be very helpful

Speaker:

because they can help you prioritize.

Speaker:

Right.

Speaker:

Like if I looked at your backup system and I saw that you, you weren't doing

Speaker:

3, 2, 1, I'd be like, dude, you gotta at least get another copy off the system.

Speaker:

And I would also say, if you're not currently doing immutable backups, that's

Speaker:

like number two, number 1, 3, 2, 1.

Speaker:

Number two would be immutable backups if you, and actually immutable, not just

Speaker:

something that's branded as immutable.

Speaker:

Right.

Speaker:

And then I would help you understand, well, what, and I'd be like, I'd

Speaker:

help you look at the product and go, well, when they say immutable.

Speaker:

They don't really mean the same thing.

Speaker:

I mean, right.

Speaker:

And then the same thing with, uh, an MSSP can help you do that, and then

Speaker:

once you get to a certain level, or maybe, maybe you start with the red

Speaker:

team, you have the red team hack you and you know, and go and, and just,

Speaker:

you just know how bad things are.

Speaker:

And then, you get a, a hit list of what you need to what, where

Speaker:

you need to, uh, start, right?

Speaker:

Yeah.

Speaker:

Uh, it, it, it's a process and it's a, it's an iterative process.

Speaker:

It's a never ending process.

Speaker:

Um, now the, the theme song from never ending story is now on my head.

Speaker:

So I hope it put it in everybody else's head.

Speaker:

And, uh, I want to thank you, Prasanna.

Speaker:

It's been another great episode.

Speaker:

I enjoyed this one.

Speaker:

I, I like these sort of quick hits where it's like, Hey, let's

Speaker:

focus on a couple areas and figure out what to do, how to help

Speaker:

people.

Speaker:

Yeah, me too.

Speaker:

Uh, hope, hope you folks enjoyed it.

Speaker:

Uh, I'm sure we'll hear in the comments if you didn't, um, and what we left out.

Speaker:

Uh, and uh, you know, that's why this is also an iterative process that is a wrap.