Get Ready Before You Get Got: Ransomware Response Planning
This timely episode features an in-depth discussion between cybersecurity expert Melissa Palmer (@vmiss) and hosts W. Curtis Preston and Prasanna Malaiyandi on the crucial role preparation and planning play in effectively responding to and recovering from the inevitable ransomware attack.
They stress that flying by the seat of your pants without an incident response plan when ransomware hits leads to chaotic, inefficient efforts and substantially higher costs. Melissa outlines pragmatic steps organizations should take before an attack to develop and test response playbooks, have partnerships in place with response firms, coordinate across internal teams, bolster detection capabilities, and harden backup/recovery mechanisms.
Curtis and Prasanna dive into real-world ransomware response scenarios to highlight the complexity organizations face in assessing the scope of damage from attacks and recalibrating restoration priorities. Melissa offers tips on creating robust processes to rebuild compromised environments quickly. They discuss table-top exercises as cost-efficient ways to uncover plan gaps and get stakeholders aligned on roles and timeline expectations.
With Melissa's depth of experience assisting ransomware victims, she provides unique insights into preparation best practices often neglected until the worst happens. For IT/security leaders looking to build organizational resilience against ransomware threats, this engaging episode delivers actionable advice on architecting defense-in-depth capabilities tailored to your business requirements.
Join us for a great episode!
ATR2500x-USB Microphone & Logitech BRIO-2: If you're like the majority of people
Speaker:
I've talked to, you don't really have an incident response plan for ransomware.
Speaker:
That means you'll be flying by the seat of your pants when you get hit.
Speaker:
The good news is I have just the episode for you.
Speaker:
It's an extremely popular episode from earlier this year where we talk with
Speaker:
Melissa Palmer about what to put in your response plan and how to build it.
Speaker:
It was so popular that it makes the perfect episode for our winter break.
Speaker:
Even if you've heard it before, it's worth a second.
Speaker:
Listen.
Speaker:
If this is your first time listening to us.
Speaker:
Hi, I'm W Curtis Preston AKA Mr.
Speaker:
Backup.
Speaker:
And I've dedicated my career of over three decades to helping those of
Speaker:
you that have the job that I had when I first started the backup person.
Speaker:
This podcast is just for you.
Speaker:
We turned backup admins into cyber recovery heroes.
Speaker:
This is the backup wrap up.
Speaker:
ATR2500x-USB Microphone-1: Welcome to the show.
Speaker:
W. Curtis Preston: I'm your host, W Curtis Preston, aka a Mr.
Speaker:
Backup, and I have with me my super expensive vacation planner coordinator.
Speaker:
How's it going?
Speaker:
Prasanna
Prasanna Malaiyandi:
I'm doing well, Curtis, how are things going?
Prasanna Malaiyandi:
Are you excited?
Prasanna Malaiyandi:
We are.
Prasanna Malaiyandi:
I we're having technical difficulties, as you could tell.
Prasanna Malaiyandi:
We're trying to keep this real, but yes, doing this for the fifth ta,
Prasanna Malaiyandi:
fifth time, it's a little hard, but
Prasanna Malaiyandi:
W. Curtis Preston: I am excited, um, uh, and my wife is starting to get excited.
Prasanna Malaiyandi:
I started showing her some pictures a while ago and she's
Prasanna Malaiyandi:
been like downplaying it.
Prasanna Malaiyandi:
Like she doesn't want to get excited.
Prasanna Malaiyandi:
She wants to be sort of, Excited, but I needed her to prep for the vacation
Prasanna Malaiyandi:
because this is, so this is, we're going to the Maldives, uh, which for
Prasanna Malaiyandi:
those that don't know, is a series of islands off the southern coast of India.
Prasanna Malaiyandi:
And, um, and, and I'm on one of those islands and, and it's a tiny island that
Prasanna Malaiyandi:
literally we could walk from one end to the other in probably about 10 minutes.
Prasanna Malaiyandi:
Um, and.
Prasanna Malaiyandi:
We're staying in one of those things over the water,
Prasanna Malaiyandi:
Prasanna Malaiyandi: Oh, the Villas over the.
Prasanna Malaiyandi:
W. Curtis Preston: villas over the water with our, we have our own
Prasanna Malaiyandi:
pool, and then right on the other side of the pool is the ocean.
Prasanna Malaiyandi:
Um, I mean, it's
Prasanna Malaiyandi:
really, really cool.
Prasanna Malaiyandi:
Can I stow away in your luggage
Prasanna Malaiyandi:
W. Curtis Preston: Yeah, I mean, it looks really cool.
Prasanna Malaiyandi:
uh, we're very excited.
Prasanna Malaiyandi:
We're having our, a repeat guest and, um, we, we had her on, uh, a few
Prasanna Malaiyandi:
weeks ago and we got talking about ransomware, one of our favorite topics.
Prasanna Malaiyandi:
And we, we, we got into this phase where it was like, you know what?
Prasanna Malaiyandi:
That, that is a great conversation, but there's no way we could, we could
Prasanna Malaiyandi:
do it justice on that recording.
Prasanna Malaiyandi:
So it was, Hey, we're gonna have her come back.
Prasanna Malaiyandi:
And, uh, she is, uh, she's been in the industry for quite a while and she's been
Prasanna Malaiyandi:
specializing in, uh, she's done VMware.
Prasanna Malaiyandi:
Uh, she did.
Prasanna Malaiyandi:
Now she's, she's working, uh, Starting to specialize in security and ransomware.
Prasanna Malaiyandi:
So we're, uh, and she's the author of the vmiss.net blog, and we are
Prasanna Malaiyandi:
excited to have her on the podcast.
Prasanna Malaiyandi:
Again, Melissa Palmer, aka @vmiss.
Prasanna Malaiyandi:
How's it going?
Prasanna Malaiyandi:
you for
Melissa Palmer:
having me back.
Melissa Palmer:
It's going good.
Prasanna Malaiyandi:
I was surprised that you were like, Ooh, I'll
Prasanna Malaiyandi:
come back on the podcast after
Melissa Palmer:
yeah, that was, of course, when I come back
Prasanna Malaiyandi:
Well, thank you for
Melissa Palmer:
scare.
Melissa Palmer:
It takes a lot more.
Melissa Palmer:
You said it.
Melissa Palmer:
I've been in around this industry for a while.
Melissa Palmer:
It takes a lot more than that to scare me away after all these years.
Prasanna Malaiyandi:
And Curtis, I think, uh, now might be a good time
Prasanna Malaiyandi:
to put out our normal disclaimer.
Prasanna Malaiyandi:
W. Curtis Preston: Yeah, prasanna and I work for different companies.
Prasanna Malaiyandi:
Uh, he works for Zoom.
Prasanna Malaiyandi:
I work for Druva.
Prasanna Malaiyandi:
This is not a podcast of either company and the opinions that you hear are ours.
Prasanna Malaiyandi:
Also, be sure to rate us at, uh, Uh, rate this podcast.com/restore
Prasanna Malaiyandi:
and, um, if you wanna join the conversation, reach out to me.
Prasanna Malaiyandi:
By the way, I, I gotta give a bunch of ways cuz I, I got some
Prasanna Malaiyandi:
complaints and people say, well, I don't use Twitter anymore.
Prasanna Malaiyandi:
So how you give your Twitter address.
Prasanna Malaiyandi:
So my LinkedIn is, you know, linkedin.com/ally/mr.
Prasanna Malaiyandi:
Backup.
Prasanna Malaiyandi:
Uh, you can find me there.
Prasanna Malaiyandi:
Uh, you can find me on Facebook.
Prasanna Malaiyandi:
I'm on Facebook, Facebook Messenger, but my email is, uh, w Curtis Preston.
Prasanna Malaiyandi:
Uh, my Facebook is w Curtis Preston.
Prasanna Malaiyandi:
I'm pretty easy to find if you're looking for me.
Prasanna Malaiyandi:
Um, and reach out to me and we'll get you in on the, on the conversation.
Prasanna Malaiyandi:
Yeah.
Prasanna Malaiyandi:
Um, the, um, this, this thing of responding to a ransomware attack,
Prasanna Malaiyandi:
this, this is something I've been spending a lot of time on lately, uh,
Prasanna Malaiyandi:
because I've been, I'm, I'm working on writing my next book, which will be
Prasanna Malaiyandi:
about responding to ransomware attacks.
Prasanna Malaiyandi:
You know, one of the things that you said in the pre-call was that if, if
Prasanna Malaiyandi:
the first time you're thinking about responding to a ransomware attack is
Prasanna Malaiyandi:
after you got a ransomware attack,
Melissa Palmer:
Um,
Melissa Palmer:
W. Curtis Preston: it's not so good.
Melissa Palmer:
Right.
Melissa Palmer:
, there's a lot of, yeah.
Melissa Palmer:
In fact, when I was looking at the, sort of the outline that I've been
Melissa Palmer:
working on for the book, most of the outline is the first half , right?
Melissa Palmer:
Everything that you need to do before, right.
Melissa Palmer:
Um,
Melissa Palmer:
that's, it's like you can't just talk about ransomware
Melissa Palmer:
recovery, Right, Like, it, it, it's a hard topic to talk about because
Melissa Palmer:
you're like, there's all this other stuff that if you haven't done it, guess what?
Melissa Palmer:
You are not gonna be able to recover.
Melissa Palmer:
So we can't just talk about recovering.
Melissa Palmer:
It doesn't work that way.
Melissa Palmer:
W. Curtis Preston: Right.
Melissa Palmer:
It's sort of like I, I've made the joke, uh, a few times probably on
Melissa Palmer:
the pod where I've said, listen, you know, I've been in the backup
Melissa Palmer:
industry, you know, a long time.
Melissa Palmer:
I, I've decided to give up backups and I'm just gonna skip straight to restores.
Melissa Palmer:
Right?
Melissa Palmer:
You can't really , you can't really do that.
Melissa Palmer:
Just like I've also said that if I'd have known how great grandkids were,
Melissa Palmer:
I would've just gone straight to them.
Melissa Palmer:
Um, but not, not really
Melissa Palmer:
Prasanna Malaiyandi: It's not how it works.
Melissa Palmer:
Yeah.
Melissa Palmer:
W. Curtis Preston: Yeah.
Melissa Palmer:
It is a really
Melissa Palmer:
good analogy though.
Melissa Palmer:
It really
Melissa Palmer:
W. Curtis Preston: Yeah, it is, it is.
Melissa Palmer:
By the way, you want a little, little sad thing.
Melissa Palmer:
So my granddaughter and her mother and, and her husband,
Melissa Palmer:
uh, are, this is their last day
Prasanna Malaiyandi:
Oh, I was gonna ask you about
Prasanna Malaiyandi:
W. Curtis Preston: been living here for a while, and they're moving out tomorrow.
Prasanna Malaiyandi:
So,
Prasanna Malaiyandi:
Hmm.
Prasanna Malaiyandi:
W. Curtis Preston: little sad moment.
Prasanna Malaiyandi:
Little sad moment.
Prasanna Malaiyandi:
No.
Prasanna Malaiyandi:
W. Curtis Preston: Um, but, uh, anyway, so, you know, sorry to bring that down.
Prasanna Malaiyandi:
So let's talk about what, what do you think, Melissa?
Prasanna Malaiyandi:
Let, let's sort of go through those things that we really needed to have done before.
Melissa Palmer:
Uh, well, lemme, lemme try to set the stage a little bit.
Melissa Palmer:
Like, does everybody remember like, the disaster recovery tests, like
Melissa Palmer:
back in the day, you go to the colo, you got the checkbook, the.
Melissa Palmer:
the
Melissa Palmer:
Clipboard you make, the checkbox isn't like, I don't know, you play
Melissa Palmer:
doom for a while and eat some food.
Melissa Palmer:
Someone restores a server and it's like,
Melissa Palmer:
well, it kind of worked and we're good.
Melissa Palmer:
Yeah,
Melissa Palmer:
that's how old I am.
Melissa Palmer:
Um, so and then you're like, oh, it kind of worked.
Melissa Palmer:
So we passed our d r test, but we can't actually recover.
Melissa Palmer:
Right?
Melissa Palmer:
So what you need to do is actually do a ransomware recovery test where
Melissa Palmer:
you actually recover everything.
Melissa Palmer:
There's a novel concept, and when you do that, you're gonna figure out all the.
Melissa Palmer:
but you didn't do cuz it's not gonna work or something's not gonna
Melissa Palmer:
whatever.
Melissa Palmer:
But it, it's, you know, talking from the backup lens cuz I was
Melissa Palmer:
at Veeam for quite some time.
Melissa Palmer:
Um, something I talked a lot about with Veeam customers was, you know, trying to
Melissa Palmer:
understand the whole recovery process.
Melissa Palmer:
Cuz if I'm the backup admin and we get ransomware, I don't just
Melissa Palmer:
go start restoring stuff all over.
Melissa Palmer:
Like that's not what happens.
Melissa Palmer:
It's not like, oh no, right somewhere tech, let me start restoring servers.
Melissa Palmer:
We'll
Melissa Palmer:
be back online in 20
Melissa Palmer:
minutes.
Melissa Palmer:
Like it doesn't work that way.
Melissa Palmer:
, you have to figure out what happened.
Melissa Palmer:
Before you can start restoring, you have to figure out what happened.
Melissa Palmer:
You have to figure out if the threat actors are still around.
Melissa Palmer:
You have to understand what was impacted.
Melissa Palmer:
I have heard a lot of people say, um, oh, well, we treat ransomware
Melissa Palmer:
different and we just recover in place.
Melissa Palmer:
So we're good to go.
Melissa Palmer:
And I'll go
Melissa Palmer:
back to the little VMware.
Melissa Palmer:
Yeah, I'll go back to the VMware ransomware thing.
Melissa Palmer:
Well, if your VMware environment is ransomware, guess what?
Melissa Palmer:
You're not recovering in place cuz there's nowhere to recover to.
Melissa Palmer:
Uh, so it's understanding all those different things.
Melissa Palmer:
You need to have some kind of understanding of what happened
Melissa Palmer:
before you can recover.
Melissa Palmer:
And that is generally driven by the incident response process, which is
Melissa Palmer:
gonna be driven by the security team.
Melissa Palmer:
So again, if you haven't talked to the security team before,
Melissa Palmer:
ransomware has attacked you.
Melissa Palmer:
You're gonna have a bad time.
Prasanna Malaiyandi:
Or vice versa, if the security team hasn't talked to you about
Prasanna Malaiyandi:
how backup integrates into that process.
Melissa Palmer:
that's really scary.
Melissa Palmer:
That's really, That's really, that's really, disturbing.
Melissa Palmer:
Those are actually
Melissa Palmer:
really even, I think that's
Melissa Palmer:
scarier.
Melissa Palmer:
W. Curtis Preston: I think it's, it's a, it's a combination, right?
Melissa Palmer:
Well, you know, uh, yesterday, I think that was yesterday, we recorded
Melissa Palmer:
a, a great podcast, uh, by the way, with Tom from Gestalt, um, that,
Melissa Palmer:
that, uh, net, uh @networkingnerd.
Melissa Palmer:
Yeah.
Melissa Palmer:
and he, uh, we were talking a lot about the networking side of the, the
Melissa Palmer:
response, right?
Melissa Palmer:
Shutting down things.
Melissa Palmer:
Um, and, and using a combination of technologies, many of which are easier
Melissa Palmer:
to use if you, if you set them up front.
Melissa Palmer:
Right.
Melissa Palmer:
And, uh, talking about things like VLANs and, uh, you know, like one of
Melissa Palmer:
the things we talked about was having a VLAN for all of your desktops and
Melissa Palmer:
laptops, so that if you want to stop everybody from doing anything, you
Melissa Palmer:
just shut off those VLANs and boom.
Melissa Palmer:
Um, there, you know, instead of having to notify 5,000 users, hey, stop doing
Melissa Palmer:
anything, you just shut off their network.
Melissa Palmer:
So they can't, they can't do anything.
Melissa Palmer:
And then if stuff is still happening, , um, well, it's not the users,
Melissa Palmer:
right?
Melissa Palmer:
It's, it's malware,
Melissa Palmer:
right?
Prasanna Malaiyandi:
back to segmentation.
Prasanna Malaiyandi:
W. Curtis Preston: know, yeah, the, the network segmentation and the, the
Prasanna Malaiyandi:
security part, I think, um, What, what, what role do you think the, I'll ask you
Prasanna Malaiyandi:
what you think before I say what I think
Prasanna Malaiyandi:
So what role do you think cyber insurance companies and then the, the companies
Prasanna Malaiyandi:
that they can put you in touch with?
Prasanna Malaiyandi:
The, the
Melissa Palmer:
Cyber insurance is becoming more and more interesting
Melissa Palmer:
cuz it gets to the point where they hand you the list of things you
Melissa Palmer:
need to do before they'll issue your policy and guess what you're
Melissa Palmer:
gonna probably be able to cover anyway.
Melissa Palmer:
Um, but a big part of, I've seen in a lot of policies lately is
Melissa Palmer:
having, um, basically an instant response from on retainer ready to go
Melissa Palmer:
as part of your policy.
Melissa Palmer:
And
Melissa Palmer:
I think that is invaluable.
Melissa Palmer:
I.
Melissa Palmer:
, everybody should have some kinda relationship with an IR firm
Melissa Palmer:
if you can't do it in house.
Melissa Palmer:
And uh, even if you can, right?
Melissa Palmer:
Sometimes you do still need that outside perspective.
Melissa Palmer:
I know a lot of larger orgs are like, no, no, we do our own ir, well, you do
Melissa Palmer:
your own ir, but you're not dealing with ransomware every day and these people are
Melissa Palmer:
so you might want a little bit of help.
Melissa Palmer:
W. Curtis Preston: Yeah.
Melissa Palmer:
Yeah.
Melissa Palmer:
Um, you know, um, I hate to do it, but a another, another movie reference.
Melissa Palmer:
I just saw the , the movie plane, and you know, the plane goes down in the
Melissa Palmer:
middle of nowhere and they brought in the guy, they brought in the incident
Melissa Palmer:
response guy basically once he showed up.
Melissa Palmer:
Right.
Melissa Palmer:
See, there's a movie reference for everything,
Melissa Palmer:
I haven't, I
Melissa Palmer:
can't tell you the last movie I've watched.
Melissa Palmer:
I really can't.
Melissa Palmer:
I don't
Melissa Palmer:
W. Curtis Preston: I can, I can, I can pull up my app, uh,
Melissa Palmer:
cuz I have the Regal Unlimited.
Melissa Palmer:
tell you the last thing I watched.
Melissa Palmer:
I can't tell you the last movie I watched, cuz I don't remember.
Melissa Palmer:
W. Curtis Preston: I, I, yeah, I, I saw like three this week.
Melissa Palmer:
So
Melissa Palmer:
in, in the theaters
Prasanna Malaiyandi:
so back to the cyber insurance from movies.
Prasanna Malaiyandi:
Uh,
Prasanna Malaiyandi:
I, yes.
Prasanna Malaiyandi:
Yeah.
Prasanna Malaiyandi:
No, but, but, but I think, well, this is one of the points that I remember
Prasanna Malaiyandi:
because remember when Tony came on from SPECT Logic, Curtis, and he was like,
Prasanna Malaiyandi:
oh my God, they got hit with ransomware.
Prasanna Malaiyandi:
And he's like, just the previous month they had signed up for cyber insurance.
Prasanna Malaiyandi:
They had an IR firm come in, give them sort of the list of, Hey, here's
Prasanna Malaiyandi:
everything you need to do to help.
Prasanna Malaiyandi:
Right.
Prasanna Malaiyandi:
And he was like, that was probably the most valuable thing of that sort of
Prasanna Malaiyandi:
cyber insurance policy was having the experts who could walk you through.
Prasanna Malaiyandi:
W. Curtis Preston: And it, and it wasn't even like he, he was just
Prasanna Malaiyandi:
lucky enough to have already, you know, contracted with them.
Prasanna Malaiyandi:
Right.
Prasanna Malaiyandi:
But the best I think would be to
Prasanna Malaiyandi:
, well, not that you would know this, but to do it not a month in advance, but
Prasanna Malaiyandi:
obviously way in
Melissa Palmer:
right.
Melissa Palmer:
W. Curtis Preston: to get, and to give you some time to work with the incident
Melissa Palmer:
response team and to make sure that you are doing the things that they want
Melissa Palmer:
but that's like that's like the problem, right?
Melissa Palmer:
Like it's not, if it's when, and you don't know when.
Melissa Palmer:
It could be tomorrow, it could be next week, it could be next month.
Melissa Palmer:
It could be next year.
Melissa Palmer:
Like you don't
Melissa Palmer:
W. Curtis Preston: It could have been three weeks ago.
Melissa Palmer:
and you just haven't realized it yet, right?
Melissa Palmer:
W. Curtis Preston: Yeah.
Prasanna Malaiyandi:
Do it today.
Prasanna Malaiyandi:
Yeah.
Melissa Palmer:
my favorite.
Melissa Palmer:
W. Curtis Preston: Yeah.
Melissa Palmer:
Uh, so, which is why it doesn't matter when you invent a time machine.
Melissa Palmer:
You know, I have bad news to you.
Melissa Palmer:
W. Curtis Preston: What
Melissa Palmer:
I haven't invented a time machine
Melissa Palmer:
because there are certain
Melissa Palmer:
points I've always promised to myself.
Melissa Palmer:
If I invented the time machine, I would go back to this point and tell
Melissa Palmer:
myself I invented the time machine.
Melissa Palmer:
And if that hasn't happened, I haven't invented it because
Melissa Palmer:
time is not linear, right?
Melissa Palmer:
So I haven't invented a time machine.
Melissa Palmer:
I'm very upset about that.
Melissa Palmer:
W. Curtis Preston: Yeah.
Melissa Palmer:
Me neither.
Melissa Palmer:
Um, but, um, well, it's been a weird, it's been, we've been jumping in and out
Melissa Palmer:
of the topic here on this podcast, but,
Prasanna Malaiyandi:
Incident response.
Prasanna Malaiyandi:
W. Curtis Preston: yeah.
Prasanna Malaiyandi:
So we, we, we get the cyber insurance folks because I
Prasanna Malaiyandi:
think in the, in the initial.
Prasanna Malaiyandi:
Ransomware phase, what people thought of cyber insurance was just a
Prasanna Malaiyandi:
company to pay their ransom for you, and that they're definitely saying
Prasanna Malaiyandi:
they're not interested in it anymore.
Melissa Palmer:
Yeah.
Melissa Palmer:
And there's
Melissa Palmer:
more costs beyond the ransom, right?
Melissa Palmer:
So
Melissa Palmer:
you paid the ransom, but what about everything else?
Melissa Palmer:
Um, that's the thing.
Melissa Palmer:
And policies have changed over time, like, back in the day a couple years ago, right?
Melissa Palmer:
Like before the pandemic, uh, it was like easy to get cyber insurance.
Melissa Palmer:
Like, oh yeah, I'll take a cyber insurance policy for 5 million, please, whatever.
Melissa Palmer:
And
Melissa Palmer:
now it's hard.
Melissa Palmer:
And if you do actually use your, I've seen a lot of cases where if you
Melissa Palmer:
actually use the insurance policy,
Melissa Palmer:
guess what?
Melissa Palmer:
They don't necessarily drop you, but guess what Your deductible co becomes.
Melissa Palmer:
What they paid for your last ransomware attack, right?
Melissa Palmer:
So if I had to pay 2.5 million, guess what?
Melissa Palmer:
I now have a 2.5 million deductible for my next attack because
Melissa Palmer:
let's face it.
Melissa Palmer:
We get IR in, right?
Melissa Palmer:
We figured out what happened, we have to recovered, and then there's a whole
Melissa Palmer:
stage where we have to do a postmortem, figure out how they got in, if they're
Melissa Palmer:
still in and close up the gaps.
Melissa Palmer:
That doesn't always happen cuz people are so, like, ohms are back, we're good to go.
Melissa Palmer:
Happy day, happy
Melissa Palmer:
day.
Melissa Palmer:
And they get hit again
Melissa Palmer:
because they never fixed the way they got in in the first place.
Melissa Palmer:
W. Curtis Preston: What, what do you think about the idea of.
Melissa Palmer:
And again, this would be driven by management.
Melissa Palmer:
And you know, a lot of times, like you said, management isn't necessarily
Melissa Palmer:
at that moment thinking about the the best way to do something.
Melissa Palmer:
They just wanna do the fastest way to do something.
Melissa Palmer:
right?
Melissa Palmer:
So another thing I've been looking into is the idea of wouldn't the best
Melissa Palmer:
practice to be to figure out how they got in before you do the recovery,
Melissa Palmer:
before you turn everything back on.
Melissa Palmer:
Yeah.
Melissa Palmer:
And that, that's where the IR firms come in, because.
Melissa Palmer:
they'll kind of get in and they'll be able to do that.
Melissa Palmer:
They'll be able to say like, you guys are so messed up.
Melissa Palmer:
You didn't have any logging unabled anywhere.
Melissa Palmer:
Like we, we can't tell right now.
Melissa Palmer:
Right?
Melissa Palmer:
It really depends on what happens in that first phase.
Melissa Palmer:
Um,
Melissa Palmer:
W. Curtis Preston: Yeah.
Melissa Palmer:
and it comes back to kind of getting ready for the
Melissa Palmer:
attack and what kind of security practice you have in some places.
Melissa Palmer:
Yeah.
Melissa Palmer:
We could see, people can figure out, uh, throw in a tool and say, yeah, guess what?
Melissa Palmer:
They came in here.
Melissa Palmer:
We know we're good to go.
Melissa Palmer:
Other times they might not find it just
Melissa Palmer:
because there was never.
Prasanna Malaiyandi:
they came in.
Prasanna Malaiyandi:
They went out before you even knew
Prasanna Malaiyandi:
or nothing was
Prasanna Malaiyandi:
W. Curtis Preston: under
Melissa Palmer:
or we didn't, you know, we didn't have logging
Melissa Palmer:
on or whatever.
Melissa Palmer:
Or they turned something off or,
Melissa Palmer:
W. Curtis Preston: Logging is a beautiful thing and, and also
Melissa Palmer:
a system to get those logs off
Melissa Palmer:
yeah, that's what
Melissa Palmer:
people like
Melissa Palmer:
forget about, like who cares about the logs, like whatever their logs.
Melissa Palmer:
No, you're, you're going to care about the
Melissa Palmer:
logs someday, I promise you.
Melissa Palmer:
W. Curtis Preston: Yeah, I mean, even if it's something as simple of making
Melissa Palmer:
sure that the logs are represented as text somewhere, that is then
Melissa Palmer:
backed up by the backup system so that you can restore all of them.
Melissa Palmer:
That's basic, but there are systems that you can buy that
Melissa Palmer:
will just automatically, uh,
Melissa Palmer:
exfiltrate all of those logs for you.
Melissa Palmer:
Yeah.
Melissa Palmer:
Yeah.
Prasanna Malaiyandi:
I wanna go back to a point you made earlier, Melissa, about
Prasanna Malaiyandi:
sort of, okay, how do you make sure that you fix the things that broke so everyone
Prasanna Malaiyandi:
isn't like, Hey, my VMs are back up.
Prasanna Malaiyandi:
I don't need to worry about these things anymore.
Prasanna Malaiyandi:
Have you heard any cases where, I know sometimes executives have
Prasanna Malaiyandi:
sort of financial liability, right?
Melissa Palmer:
I've heard of that trend, right?
Melissa Palmer:
Like your guess what your bonus is tied to if you get ransomware or not, and how you.
Melissa Palmer:
And stuff like that, that's starting to happen in some places.
Melissa Palmer:
Um, but a lot of it comes down to maybe the processes were
Melissa Palmer:
never clearly defined upfront.
Melissa Palmer:
Right.
Melissa Palmer:
And that's where a lot of the cyber insurance stuff can
Melissa Palmer:
actually come in and help.
Melissa Palmer:
Well, they'll be like, you need to show us your response process.
Melissa Palmer:
And they'll be like, here you go.
Melissa Palmer:
And they'll be like, okay, so where's the rest of it?
Melissa Palmer:
Or something like that, right?
Melissa Palmer:
Like, what, what
Melissa Palmer:
happened?
Melissa Palmer:
Like, this is it.
Melissa Palmer:
Like here's
Melissa Palmer:
a page.
Melissa Palmer:
Like it's not gonna work.
Melissa Palmer:
Um, and again, it comes back to.
Melissa Palmer:
the old school DR test.
Melissa Palmer:
Like there needs to be ransomware recovery tests and postmortems of
Melissa Palmer:
that ransomware recovery test, right?
Melissa Palmer:
Like y'all need to get in room, figure out what worked, what didn't
Melissa Palmer:
work.
Melissa Palmer:
W. Curtis Preston: Having done the old school DR test, I'm curious as to how
Melissa Palmer:
they do a ransomware recovery test.
Melissa Palmer:
Because one of the hardest parts of a ransomware recovery is that the
Melissa Palmer:
attacker is there is still attacking, like with a dr, you just say,
Melissa Palmer:
okay, those six systems are dead.
Melissa Palmer:
So, yeah.
Melissa Palmer:
So
Melissa Palmer:
here's where it
Melissa Palmer:
gets complicated.
Melissa Palmer:
You need to test multiple types of recoveries, right?
Melissa Palmer:
So maybe I'm recovering, please.
Melissa Palmer:
I, I can't.
Melissa Palmer:
, I will vomit in my mouth if I say maybe I'm recovering in place.
Melissa Palmer:
I can't even like say that.
Melissa Palmer:
So we're not gonna say that, but like maybe I'm going to my second site.
Melissa Palmer:
Maybe I'm going to a warm site.
Melissa Palmer:
Maybe I'm going to a hot site.
Melissa Palmer:
Maybe I'm going to a public cloud.
Melissa Palmer:
Maybe I'm going to a VMware cloud.
Melissa Palmer:
You gotta test all those, right?
Melissa Palmer:
Because
Melissa Palmer:
you don't know where you're going until that incident response
Melissa Palmer:
phase starts, especially when law enforcement gets involved, right?
Melissa Palmer:
So let's say stuff's really bad, the FBI comes, and guess what?
Melissa Palmer:
We are quarantining your whole data center while we investigate.
Melissa Palmer:
Then what do you do?
Prasanna Malaiyandi:
Yeah.
Prasanna Malaiyandi:
You're down for business, otherwise,
Melissa Palmer:
do?
Melissa Palmer:
No, you go to public cloud, you go to um, a service provider, you go someplace else.
Melissa Palmer:
So you have to have all that ironed out ahead of time.
Melissa Palmer:
You have to know that there's different considerations for recovery from
Melissa Palmer:
ransomware attack than a traditional
Melissa Palmer:
disaster.
Melissa Palmer:
So I guess, you know, from a traditional disaster, like what if
Melissa Palmer:
the zombies eat both data centers,
Melissa Palmer:
right?
Melissa Palmer:
Then you would still need to go to the
Prasanna Malaiyandi:
but people probably aren't thinking about that though, right?
Prasanna Malaiyandi:
The fact that, hey, maybe the F B I will come quarantine, right?
Prasanna Malaiyandi:
Do you have your backups offsite?
Prasanna Malaiyandi:
Do you have it in someplace that you can bring it up?
Prasanna Malaiyandi:
And like you mentioned earlier, Melissa, it's like things you should plan for ahead
Prasanna Malaiyandi:
of time before you get to the point where you are trying to recover from ransomware.
Melissa Palmer:
Exactly.
Melissa Palmer:
And again, unless an organization, so I have a couple of examples
Melissa Palmer:
of, I don't wanna say Dr.
Melissa Palmer:
Done wrong, but uh, I worked for an uh, company when I was
Melissa Palmer:
an intern on Wall Street and everything was in New York City.
Melissa Palmer:
and nine 11 happened and they were a block from the World Trade Center.
Melissa Palmer:
That's what they couldn't, they couldn't do anything like they were done.
Melissa Palmer:
Right.
Melissa Palmer:
Like they were just done.
Melissa Palmer:
So they like rebuilt their systems in a hotel room someplace.
Melissa Palmer:
Right.
Melissa Palmer:
And that kicked off a huge project to say, we actually need a second data
Melissa Palmer:
center and it needs to be not around here.
Melissa Palmer:
Right.
Melissa Palmer:
Um, I'm also on the east coast, right?
Melissa Palmer:
So New York, hurricane Sandy, we had this hurricane roll through.
Melissa Palmer:
And again, like the data centers are like 20 miles from each other.
Melissa Palmer:
Guess.
Melissa Palmer:
, they both tanked.
Melissa Palmer:
Um, so things like that.
Melissa Palmer:
So until an organization actually has something happen to them, it's really,
Melissa Palmer:
and here's the issue, the, the, the difference between disaster recovery
Melissa Palmer:
and ransomware recovery, when we talk about it, traditional disaster
Melissa Palmer:
recovery stuff, until it happens, it's easy to accept the risk, right?
Melissa Palmer:
Well, you know what?
Melissa Palmer:
It's cheaper for us to just like recover from this disaster and be down for
Melissa Palmer:
two weeks than it is to actually put everything into place where we build a
Melissa Palmer:
second site, yada, yada, yada, yada, et.
Melissa Palmer:
that's because the risk is so low, right?
Melissa Palmer:
And there's all kinds of equations for
Melissa Palmer:
this in, you know, cybersecurity and stuff like that.
Melissa Palmer:
But when you change it to ransomware, the risk is going to, it's going to
Melissa Palmer:
happen like a probability of one.
Melissa Palmer:
It
Melissa Palmer:
will happen.
Melissa Palmer:
Um, and that's what people don't understand.
Melissa Palmer:
Like this is going to happen.
Melissa Palmer:
It's not like you can say like, well, you know, we haven't had a hundred
Melissa Palmer:
years storm ever, so we'll be fine.
Melissa Palmer:
Um, it's different like that.
Melissa Palmer:
And a lot of people, I've actually seen a huge uptick in people getting.
Melissa Palmer:
I don't think a lot of people are where they need to be.
Melissa Palmer:
Um, but I think as people get ready and it gets harder and harder to attack
Melissa Palmer:
people because they've put like some semblance of security in it, right?
Melissa Palmer:
You're gonna go for the low-hanging fruit, you're gonna see the people
Melissa Palmer:
who aren't ready get hit harder and you're just gonna see more and more
Melissa Palmer:
attacks and the threat actors are gonna have to get more creative.
Prasanna Malaiyandi:
So here's a question for you.
Prasanna Malaiyandi:
Normally when we think about backup and recovery, right, it's always
Prasanna Malaiyandi:
about restoring your data or your application because there might be
Prasanna Malaiyandi:
a hardware failure, an application fault, user error, et cetera.
Prasanna Malaiyandi:
Sometimes people talk about ransomware in the same context as
Prasanna Malaiyandi:
disaster recovery and sort of those
Melissa Palmer:
Ransomware is a disaster.
Melissa Palmer:
I
Prasanna Malaiyandi:
but, but here's the question though, Melissa
Prasanna Malaiyandi:
is, Like you had just mentioned, it's not the same as a flood or a
Prasanna Malaiyandi:
hurricane or something like that.
Prasanna Malaiyandi:
And so are we kind of pushing ourselves and kind of giving people
Prasanna Malaiyandi:
the false impression that it is similar to those other disasters
Prasanna Malaiyandi:
and things that they shouldn't worry about versus we should be treating
Prasanna Malaiyandi:
it similar to like an application failure or user failure and treating it
Prasanna Malaiyandi:
similar.
Prasanna Malaiyandi:
It's like more towards that side of the spectrum than this side.
Melissa Palmer:
and you know, that all falls under DR
Melissa Palmer:
anyway, like hardware failure
Melissa Palmer:
and all that kind of stuff.
Melissa Palmer:
Um, and again, in a lot of those cases, it's easy to say, well, you know what?
Melissa Palmer:
I don't really want a second site.
Melissa Palmer:
It's
Melissa Palmer:
just cheaper to deal with the hardware.
Melissa Palmer:
It'll take we'll rush order.
Melissa Palmer:
I was in a situation at a company, we'll just rush order at a new array from
Melissa Palmer:
E M C that will solve our problems.
Melissa Palmer:
Like that was the plan and that happened.
Melissa Palmer:
Um, so crazy stuff like that.
Melissa Palmer:
But the problem, why I like to make the analogy so much is the problem
Melissa Palmer:
is when you tell someone that you have to get ready to recover from
Melissa Palmer:
ransomware, they're just like, I don't.
Melissa Palmer:
what to do.
Melissa Palmer:
You have to put it in some context that kind of makes sense.
Melissa Palmer:
I mean, disaster recovery is definitely like not sexy, even though
Melissa Palmer:
I've done it most in my career.
Melissa Palmer:
Um, but it's something that everybody has an inkling about at least, right?
Melissa Palmer:
Everybody kind of knows that there is usually a DR test once or twice or year a
Melissa Palmer:
minimum.
Melissa Palmer:
Um, so it's a way, it's a starting
Melissa Palmer:
point, right?
Melissa Palmer:
It's not your final destination, but it's a starting
Melissa Palmer:
point.
Melissa Palmer:
It's a.
Melissa Palmer:
place to start context.
Melissa Palmer:
Maybe you have some playbook, some processes that we can leverage to go build
Melissa Palmer:
on top of that and say, okay, so how do we make sure that we can recover now under
Melissa Palmer:
any
Melissa Palmer:
W. Curtis Preston: I like to, I like to say that it's a subset, right?
Melissa Palmer:
A DR is a subset of a ransomware recovery, but there's so much else, right?
Melissa Palmer:
And the big thing, the but, and I think you said it already, Prasanna, but the
Melissa Palmer:
big thing to me, the difference between a DR and a ransomware attack, um, is
Melissa Palmer:
that the, the disaster isn't, Right.
Melissa Palmer:
You're, you're still right
Melissa Palmer:
that the disaster never
Melissa Palmer:
W. Curtis Preston: a flood is gone, you're like, okay, all
Melissa Palmer:
these servers got wiped out.
Melissa Palmer:
So those are the
Melissa Palmer:
because the threat is still there.
Melissa Palmer:
Just because you
Melissa Palmer:
recovered from the ransomware attacked doesn't mean they're not
Melissa Palmer:
gonna hit you again, or someone else
Melissa Palmer:
isn't gonna hit
Melissa Palmer:
W. Curtis Preston: Right.
Melissa Palmer:
Well, and, and how do you even know,
Melissa Palmer:
um, You know, like when you, when when a hurricane wipes out a data
Melissa Palmer:
center, you're like, okay, those are the servers we need to restore.
Melissa Palmer:
But how do, when you walk into your data center and there's a
Melissa Palmer:
ransomware attack going on, how do you even know which servers have
Melissa Palmer:
been affected or not affected?
Melissa Palmer:
Right.
Melissa Palmer:
That's, that is a big part of it.
Prasanna Malaiyandi:
Yeah, and I guess the other thing is even like you
Prasanna Malaiyandi:
might see the active infection, like things are being encrypted, et cetera,
Prasanna Malaiyandi:
but it might just be lying silently.
Prasanna Malaiyandi:
Right.
Prasanna Malaiyandi:
We've talked about dwell time in the past, right.
Prasanna Malaiyandi:
Where it's
Melissa Palmer:
chill.
Melissa Palmer:
They just chill in there for a while.
Melissa Palmer:
Like, who knows?
Melissa Palmer:
Um, I, I can't remember off the top of my head, but I remember reading like a big
Melissa Palmer:
name breach or something like that, or a big name attack, and they said they were
Melissa Palmer:
in the network for like six months or
Prasanna Malaiyandi:
I think Solar Winds was like
Melissa Palmer:
was it?
Melissa Palmer:
I don't remember.
Melissa Palmer:
But I remember reading a couple of them where they've been in
Melissa Palmer:
there a significant period of time and who knows what they're doing
Melissa Palmer:
there, right?
Melissa Palmer:
Like who knows
Melissa Palmer:
unless you catch them.
Melissa Palmer:
So it's about
Melissa Palmer:
W. Curtis Preston: yeah.
Melissa Palmer:
The meantime is something like 60 days actually is what I, what I read.
Melissa Palmer:
Um,
Melissa Palmer:
be the worst ransomware person.
Melissa Palmer:
I'd be like, let's go, let's go.
Melissa Palmer:
It's like, no, you're not supposed to do that.
Melissa Palmer:
You gotta
Melissa Palmer:
take your time and traverse
Melissa Palmer:
through the network and get ad.
Melissa Palmer:
I'd be like, let's go encrypt VMware.
Melissa Palmer:
Let's go.
Melissa Palmer:
I'd be caught so fast.
Melissa Palmer:
Or maybe I wouldn't, maybe I.
Prasanna Malaiyandi:
You're only caught if someone's monitoring and watching.
Prasanna Malaiyandi:
Right Melissa?
Melissa Palmer:
Right.
Melissa Palmer:
And you need
Melissa Palmer:
to be looking for the right things.
Melissa Palmer:
W. Curtis Preston: Yeah.
Melissa Palmer:
As soon as you encrypt a, a vm, uh, you're gonna set off alarm or two.
Melissa Palmer:
Um, but I, I think you encrypt, I think you encrypt a lot of
Melissa Palmer:
files that no one's looking at.
Melissa Palmer:
Right.
Melissa Palmer:
But the moment you start
Melissa Palmer:
Once you hit the the thing,
Melissa Palmer:
the only thing is you'll hit.
Melissa Palmer:
You'll hopefully you'll be caught as soon as you start encrypting the VMs.
Melissa Palmer:
You do them all at once, so it doesn't matter.
Melissa Palmer:
W. Curtis Preston: Yeah.
Melissa Palmer:
Right.
Melissa Palmer:
Cuz it's,
Melissa Palmer:
I got all of 'em.
Melissa Palmer:
It doesn't matter that you caught me doing the first one, I did them all.
Melissa Palmer:
Um, but yeah, so generally they're in their wreaking havoc, steal maybe
Melissa Palmer:
exfiltrating data, doing some stuff before they go encryption habit.
Melissa Palmer:
Or maybe like, I've heard cases recently where they don't even
Melissa Palmer:
bother, like encrypting stuff.
Melissa Palmer:
They're just stealing data at this point and
Melissa Palmer:
be like, by the way, look what we have.
Prasanna Malaiyandi:
Is that easier by the way, to steal data?
Prasanna Malaiyandi:
Because it seems that you can sort of fly under the radar if you just steal
Prasanna Malaiyandi:
data because people will probably, maybe they notice, maybe they don't,
Prasanna Malaiyandi:
but it's not as obvious as, say,
Melissa Palmer:
It
Melissa Palmer:
is definitely not as obvious as encrypting stuff, I'm like
Melissa Palmer:
this weird monitoring nerd too.
Melissa Palmer:
I had like this monitoring fetish at Veeam.
Melissa Palmer:
It was very strange.
Melissa Palmer:
Um, so like, I would like really hone in on like what to look
Melissa Palmer:
for to catch that too, right?
Melissa Palmer:
But not everybody is crazy like me.
Melissa Palmer:
Um,
Melissa Palmer:
W. Curtis Preston: I think, I think,
Melissa Palmer:
yeah, I do.
Melissa Palmer:
To answer your question, Prasanna, I do think that exfiltration as an overall
Melissa Palmer:
process is easier in that if you can get any data out that there's a, there's a
Melissa Palmer:
much higher chance that they will respond.
Melissa Palmer:
That they will pay the ransom.
Melissa Palmer:
Right?
Melissa Palmer:
Because backups aren't gonna help.
Melissa Palmer:
I'm looking at my black hat over there.
Melissa Palmer:
I'm wondering if I should like, put it on for this discussion or something.
Melissa Palmer:
Um,
Melissa Palmer:
like you would probably like see like, all right, like if I'm a bad person,
Melissa Palmer:
I'm not a bad person, I'm a good person.
Melissa Palmer:
Um, like they start small,
Melissa Palmer:
right?
Melissa Palmer:
They grab a file here and there and they see if they
Prasanna Malaiyandi:
if anyone notices.
Melissa Palmer:
this, grab that, right?
Melissa Palmer:
Like, you don't go and just be like, oh look, here's the final.
Melissa Palmer:
25 million gigabytes of MP3s.
Melissa Palmer:
I'm gonna take it all at once.
Melissa Palmer:
No, they're like picky and choosy.
Melissa Palmer:
They try to find the sensitive data.
Melissa Palmer:
They take a little bit here and there.
Melissa Palmer:
Maybe they only need to grab a couple spreadsheets.
Melissa Palmer:
Right?
Melissa Palmer:
It's not like,
Melissa Palmer:
I think there's this misnomer that like they get in there and I'm just gonna
Melissa Palmer:
start downloading massive chunks of
Melissa Palmer:
data.
Melissa Palmer:
W. Curtis Preston: well,
Melissa Palmer:
that's the whole point of
Melissa Palmer:
so you could exfiltrate a vm, just like
Melissa Palmer:
download the vmd K and be like,
Melissa Palmer:
W. Curtis Preston: yeah, exactly.
Melissa Palmer:
ad.
Melissa Palmer:
Have a
Melissa Palmer:
nice life
Melissa Palmer:
W. Curtis Preston: that's that whole phase of the, um, the initial phase of an attack
Melissa Palmer:
is trying to expand out, seeing what you can find out, seeing if you can find
Melissa Palmer:
a spreadsheet called customer database
Melissa Palmer:
You know?
Melissa Palmer:
Right.
Melissa Palmer:
W. Curtis Preston: xls , right.
Melissa Palmer:
Um,
Melissa Palmer:
or like.
Melissa Palmer:
you might not bother encrypting everything, but if you
Melissa Palmer:
can't find much, you say, all right, I'll steal some stuff and tell 'em I
Melissa Palmer:
have some files, but I won't tell them what I'll hope that'll make them pay.
Melissa Palmer:
And I'll just
Melissa Palmer:
go, you know, encrypt some stuff while.
Melissa Palmer:
Which is more illegal?
Melissa Palmer:
Is one more legal than the other?
Prasanna Malaiyandi:
I think they both are pretty bad,
Melissa Palmer:
is one more illegal than the other?
Melissa Palmer:
W. Curtis Preston: Well, they're both extortion.
Melissa Palmer:
Yeah,
Melissa Palmer:
W. Curtis Preston: the act,
Melissa Palmer:
The act
Melissa Palmer:
but if you're actually exfiltrating, you're stealing it.
Melissa Palmer:
W. Curtis Preston: yeah.
Melissa Palmer:
That's gonna depend on where this happens.
Melissa Palmer:
Uh, whether or not exfiltrating the data is a different crime.
Melissa Palmer:
And damaging the data.
Melissa Palmer:
Um, but, uh, but in the, the extortion happens on both sides, right?
Melissa Palmer:
And that's
Melissa Palmer:
definitely illegal in
Melissa Palmer:
that
Melissa Palmer:
W. Curtis Preston: pretty much
Melissa Palmer:
every jurisdiction
Melissa Palmer:
legal kids.
Prasanna Malaiyandi:
Yeah, so we talked about, so we talked
Prasanna Malaiyandi:
about incident response.
Prasanna Malaiyandi:
You've now been hit by a ransomware attack.
Prasanna Malaiyandi:
in, then let's just take VMware environments, right?
Prasanna Malaiyandi:
So what do you see people doing like, or what are things that they
Prasanna Malaiyandi:
should be doing that they're not?
Prasanna Malaiyandi:
Like, how do they even approach
Melissa Palmer:
Yeah, so he,
Prasanna Malaiyandi:
VMware environment gets encrypted Now, what
Melissa Palmer:
Um, to me it's trash.
Melissa Palmer:
I would throw it away and start over, like, I'm not even joking.
Melissa Palmer:
Throw it
Melissa Palmer:
W. Curtis Preston: No, not
Prasanna Malaiyandi:
and, and, and, and how much?
Prasanna Malaiyandi:
And and how much would you, when you say throw it away, are you talking about
Prasanna Malaiyandi:
throwing away the virtual machines, throwing away the ESXi servers, the.
Melissa Palmer:
the host, wipe the storage array, wipe it all and start over.
Melissa Palmer:
Um, and, and here's the thing, right?
Melissa Palmer:
So like, you know, I, I like it.
Melissa Palmer:
I have this weird side of me that also does like weird blogging stuff, right?
Melissa Palmer:
And like, I like SEO and stuff like that.
Melissa Palmer:
And even my career at Veeam people are like, how do I back up my VMware host?
Melissa Palmer:
you don't, they're like, what do you mean?
Melissa Palmer:
I'm like, you don't, um, you automate the build process
Melissa Palmer:
and the configuration, right?
Melissa Palmer:
You don't actually back up your host and restore it.
Melissa Palmer:
It's, you
Prasanna Malaiyandi:
You just rebuild
Melissa Palmer:
thing.
Melissa Palmer:
It's a clean install and you configure it.
Melissa Palmer:
Um, so that's what people need to be testing to is how I would
Melissa Palmer:
actually recover is almost misnomer.
Melissa Palmer:
Cuz Prasannally I would trash it.
Melissa Palmer:
Um, how do I re rapidly rebuild a VMware environment?
Melissa Palmer:
And that's something.
Melissa Palmer:
People don't do every day, right?
Melissa Palmer:
Like that stuff runs like you might have not even reinstalled.
Melissa Palmer:
You could have just been
Melissa Palmer:
upgrading for the last like 10 years and like, whatever, probably not 10, probably
Melissa Palmer:
four or five years, you'll get a new host.
Melissa Palmer:
I don't know.
Melissa Palmer:
It depends.
Melissa Palmer:
Um, so that's something that people don't practice and don't do.
Melissa Palmer:
Um, and you can actually do that all.
Melissa Palmer:
for the most part, um, in a nested virtualization environment.
Melissa Palmer:
Get all your processes down stuff.
Melissa Palmer:
So it's a pretty low co I mean, you should test on your physical hardware
Melissa Palmer:
at some point for any drivers and stuff, but it's actually a relatively low
Melissa Palmer:
cost and effort thing to figure out.
Melissa Palmer:
It's not rocket science.
Prasanna Malaiyandi:
But when you do this testing, wouldn't you also want to
Prasanna Malaiyandi:
involve, say like your networking team,
Melissa Palmer:
Yes, you would wanna, any of
Melissa Palmer:
this testing, you wanna involve anybody?
Melissa Palmer:
Everybody, right?
Melissa Palmer:
Everybody should be involved in this.
Melissa Palmer:
everybody.
Melissa Palmer:
And that's I think, one of the biggest problems we see that they're not,
Melissa Palmer:
W. Curtis Preston: So when you say,
Melissa Palmer:
They're like, I don't have time to do this.
Melissa Palmer:
W. Curtis Preston: when you say rebuild the VMware environment,
Melissa Palmer:
um, obviously you're talking about vm, you know, wiping the hosts and,
Melissa Palmer:
and the storage and all of that.
Melissa Palmer:
When we get to the phase of actually bringing back VMs,
Melissa Palmer:
Mm-hmm.
Melissa Palmer:
W. Curtis Preston: what way would you do that?
Melissa Palmer:
Um, so most backup software these days have something
Melissa Palmer:
built in where it'll actually scan for ransomware as you are restoring, right?
Melissa Palmer:
And find the ransomware if it's there.
Melissa Palmer:
Cause at that point, you know what you're infected with,
Melissa Palmer:
so you know what to look for.
Melissa Palmer:
Um, so I would be either scanning it or, you know, if you have really good.
Melissa Palmer:
and then you can decide how you're gonna fix it, or you're just gonna go
Melissa Palmer:
back to an earlier point or whatever.
Melissa Palmer:
Um, you know, some people are really good with the IR stuff and say, we know the
Melissa Palmer:
ransomware came in this date, this time we are absolutely a million percent certain
Melissa Palmer:
because we have all these logs go back to the last known good restore point, right?
Melissa Palmer:
Um, so it really depends.
Melissa Palmer:
But the backup people gonna be a big part of that, right?
Melissa Palmer:
Because it's gonna be
Melissa Palmer:
W. Curtis Preston: Y Yeah, I,
Melissa Palmer:
do they have built in?
Melissa Palmer:
W. Curtis Preston: this is something I put a lot of thought into lately
Melissa Palmer:
of if the meantime of a, of a.
Melissa Palmer:
Infection is 60 days, and some of them are twice that,
Melissa Palmer:
um, the, the idea of of saying, oh, well we got, we got infected December 1st,
Melissa Palmer:
so we're gonna restore to December 1st.
Melissa Palmer:
That's a
Melissa Palmer:
That doesn't, it doesn't always work.
Melissa Palmer:
In some cases it might, in some cases it won't.
Melissa Palmer:
And then you're going
Melissa Palmer:
back to scanning,
Melissa Palmer:
W. Curtis Preston: So you've got, you've got to, I think in most
Melissa Palmer:
cases, if many, if not most cases, you're gonna do a restoring.
Melissa Palmer:
Yeah.
Melissa Palmer:
I've seen kind of almost like two stage recoveries too.
Melissa Palmer:
Like get the bare minimum of stuff something up and run something
Melissa Palmer:
online up and running, right.
Melissa Palmer:
To restore services and then do the full recovery later.
Melissa Palmer:
So you're not, you might be like, all right, so you know what?
Melissa Palmer:
We can roll these servers back to December 29th.
Melissa Palmer:
We can use the newest copy of the database.
Melissa Palmer:
We can mash it together and make it work and serve our customers
Melissa Palmer:
while we're actually restoring everything the right way.
Prasanna Malaiyandi:
Rackspace,
Melissa Palmer:
So it did that.
Melissa Palmer:
W. Curtis Preston: Prasanna.
Melissa Palmer:
Yeah.
Melissa Palmer:
you okay?
Melissa Palmer:
You were eating another sip of tea there.
Melissa Palmer:
W. Curtis Preston: It's what I thought of when you, when you, as soon as
Melissa Palmer:
she said that, I, yeah, I know.
Melissa Palmer:
Yeah.
Melissa Palmer:
Just make sure.
Melissa Palmer:
Unlike Rackspace, just make sure that you thought of this beforehand.
Melissa Palmer:
Right.
Melissa Palmer:
The only way that this is gonna work is if you identify what are the three
Melissa Palmer:
services that need to be up right away so that we can function as a company and
Melissa Palmer:
what are the other 20, 5,000 services
Melissa Palmer:
That kind of, um, that ties almost more into like
Melissa Palmer:
the business con, you know, B C D R
Melissa Palmer:
W. Curtis Preston: Yeah.
Melissa Palmer:
Yeah,
Melissa Palmer:
continuity sort.
Melissa Palmer:
Like what are our key applications and what level of, what do we have
Melissa Palmer:
to do to get those online First comes back to our RPOs and RTOs, right?
Melissa Palmer:
W. Curtis Preston: yeah,
Melissa Palmer:
it's, it's,
Melissa Palmer:
the thing is, it's, such a
Melissa Palmer:
big discussion that unless you've had it cross-functionally with the
Melissa Palmer:
business owners and the app owners, and the infrastructure owners and the
Melissa Palmer:
security team, you're not in a good.
Melissa Palmer:
W. Curtis Preston: Yeah.
Melissa Palmer:
I, I think, I think it's, it's just, it's one thing to have a discussion,
Melissa Palmer:
again, going to Dr versus rr, um, is that it's one thing to go, well, what
Melissa Palmer:
are the servers we're gonna do first?
Melissa Palmer:
And what are, what are the servers that we're gonna do three hours later?
Melissa Palmer:
It's a whole other thing to say, what are the servers we're gonna do the
Melissa Palmer:
first couple of days, and what are the servers we're gonna do next week?
Melissa Palmer:
Right.
Melissa Palmer:
I,
Melissa Palmer:
And that, that's the problem, right?
Melissa Palmer:
You don't know until it happens.
Melissa Palmer:
Like if,
Melissa Palmer:
if you, if it's your whole environment is done right.
Melissa Palmer:
That is very different than, oh, we know, just, they just did this
Melissa Palmer:
subset of servers or whatever.
Melissa Palmer:
It's,
Melissa Palmer:
and like we were, um, The company I worked for a company
Melissa Palmer:
that I no longer worked there.
Melissa Palmer:
It was a pr uh, I was a customer and they had a, a very, they were one of the first
Melissa Palmer:
really, really big ransomware attacks in the news, and it was like a disaster.
Melissa Palmer:
I was like, wow, I'm glad I'm not on the VMware team anymore
Melissa Palmer:
there when this is going down.
Melissa Palmer:
Right.
Melissa Palmer:
Um, , but it really depends and you don't know what's gonna happen.
Melissa Palmer:
The only thing you can do is be as prepared as possible, right?
Melissa Palmer:
Test different recovery methods.
Melissa Palmer:
Um, and I love RPOs and RTOs in saying that we can meet them under a testing
Melissa Palmer:
scenario, but in the real world, we don't know that that's gonna happen.
Melissa Palmer:
W. Curtis Preston: Yeah.
Prasanna Malaiyandi:
One of the things on the podcast we talked about a couple
Prasanna Malaiyandi:
days ago was, Like Tom was mentioning, oh yeah, you just shut down your
Prasanna Malaiyandi:
network and you start figuring out, okay, what was affected but in what?
Prasanna Malaiyandi:
And you prevent everything go from going in and out.
Prasanna Malaiyandi:
And I was like, but how do you communicate?
Prasanna Malaiyandi:
Right?
Prasanna Malaiyandi:
And he's like, yeah, make sure you have ahead of time, sort of use cell phones.
Prasanna Malaiyandi:
iMessage can work.
Prasanna Malaiyandi:
You can set up a separate Slack instance completely outside of
Prasanna Malaiyandi:
the corporate environment, right?
Prasanna Malaiyandi:
Whatever it is to keep that ongoing communications.
Melissa Palmer:
like, uh, how am I supposed to use Microsoft Teams to
Melissa Palmer:
communicate with a security team?
Melissa Palmer:
Well, that might be Office 365.
Melissa Palmer:
That might be, okay, that's a bad example.
Melissa Palmer:
W. Curtis Preston: Yeah, as long as you have a, as long as you have a,
Melissa Palmer:
um, an internet connection, right?
Melissa Palmer:
Um, which is pretty easy
Melissa Palmer:
to get
Melissa Palmer:
but
Melissa Palmer:
like who has people's
Melissa Palmer:
phone numbers these days?
Melissa Palmer:
W. Curtis Preston: people with incident response plans, that's who
Melissa Palmer:
yeah, that's
Prasanna Malaiyandi:
But But aren't there issues though, where ransomware
Prasanna Malaiyandi:
actors might still have access to your Slack instance and be monitoring
Prasanna Malaiyandi:
what's going on from an incident
Melissa Palmer:
I've
Melissa Palmer:
seen that.
Melissa Palmer:
I've
Melissa Palmer:
seen that.
Melissa Palmer:
I've seen, I have seen that happen where like, they still had access.
Melissa Palmer:
It was teams.
Melissa Palmer:
I think
Melissa Palmer:
they still had access.
Melissa Palmer:
They were watching the IR
Melissa Palmer:
stuff happen as they were still in there hanging out.
Melissa Palmer:
It's like, oh yeah, Y again,
Melissa Palmer:
W. Curtis Preston: ransomware stuff is bad.
Melissa Palmer:
Melissa, I'm just gonna take that stance.
Melissa Palmer:
bad.
Melissa Palmer:
It's bad, and you don't know what's gonna happen until it happens.
Melissa Palmer:
Which is why, and it ties back to incident response, right?
Melissa Palmer:
And having an incident response firm on retainer that does this every day.
Melissa Palmer:
Right?
Melissa Palmer:
Because I, I don't care how good, even if, like, okay, let's say
Melissa Palmer:
you drop Melissa into X, Y, Z company and you put her in charge.
Melissa Palmer:
W. Curtis Preston: Do are you gonna repel down a rope from a helicopter?
Melissa Palmer:
Because that
Melissa Palmer:
Yes, I'm gonna repel down a rope from a helicopter,
Melissa Palmer:
drop me in, right, and say, Melissa, get ready for ransomware,
Melissa Palmer:
and six months later you hit me.
Melissa Palmer:
I would like to say that I'll be able to recover, but I don't know that.
Melissa Palmer:
I don't know.
Melissa Palmer:
That doesn't matter how good you are, you're not doing this every
Melissa Palmer:
day, right?
Melissa Palmer:
Like, so unless you're doing this every day, cuz every attack is different.
Melissa Palmer:
It's gonna be like, what have these people seen in the other events?
Melissa Palmer:
What, what ransomware gang have you been hit by?
Melissa Palmer:
Right?
Melissa Palmer:
So I can put everything into place that I think I will need
Melissa Palmer:
to make sure that we recover.
Melissa Palmer:
And yeah, honestly, we'd probably recover all our data.
Melissa Palmer:
I don't know if we meet our RPOs and our tails.
Melissa Palmer:
I, I, I'm pretty sure I could get all the data to the recoverable point,
Melissa Palmer:
but what was Exfiltrated, how did they get in all that kind of stuff.
Melissa Palmer:
you don't know, which is why you have to call the pros.
Melissa Palmer:
You have to call the people that do this every day.
Prasanna Malaiyandi:
Is there sort of a standard ransomware recovery test, but.
Prasanna Malaiyandi:
That kind of outlines like, Hey, here are the thing.
Prasanna Malaiyandi:
Because I can imagine, say you can't afford, the pros
Prasanna Malaiyandi:
say you can't afford the pros.
Prasanna Malaiyandi:
Right?
Prasanna Malaiyandi:
Is there sort of a, here are the testing scenarios you should be thinking
Prasanna Malaiyandi:
about, or here are the things that sort of get shot in the head when a
Prasanna Malaiyandi:
ransomware recovery or ransomware hits.
Melissa Palmer:
Um, Google tabletop exercises like ransomware
Melissa Palmer:
recovery, disaster recovery,
Melissa Palmer:
tabletop exercises.
Melissa Palmer:
Right?
Melissa Palmer:
That's a good place to start.
Melissa Palmer:
I've thought about doing like a dungeon and dragon style type,
Melissa Palmer:
like ransomware recovery thing.
Melissa Palmer:
I
Melissa Palmer:
Prasanna Malaiyandi: With the actual people.
Melissa Palmer:
Yeah, with like you get the networking security
Melissa Palmer:
think that would be
Melissa Palmer:
fun and useful.
Melissa Palmer:
And you know what?
Melissa Palmer:
When you make things fun, people actually pay a.
Prasanna Malaiyandi:
Yep.
Melissa Palmer:
right?
Melissa Palmer:
So like, if I get you all in terms and be like, today we are going to talk
Melissa Palmer:
about ransomware recovery and have a mock simulation of what would happen.
Melissa Palmer:
Be like, okay, you're a Paladin, you're a warrior, uh, you're a ma.
Melissa Palmer:
Uh, an adult black dragon just showed up and encrypted your VMs.
Melissa Palmer:
What are you doing?
Melissa Palmer:
Right?
Melissa Palmer:
Like,
Melissa Palmer:
you're gonna have so much fun,
Melissa Palmer:
you're gonna remember it, and it's gonna work out a lot better.
Prasanna Malaiyandi:
Yeah.
Prasanna Malaiyandi:
W. Curtis Preston: I like that.
Prasanna Malaiyandi:
Yeah.
Prasanna Malaiyandi:
Um, by the way, one of the things, you know, we talked a lot about prepping.
Prasanna Malaiyandi:
One of the things that I think also in terms of, we talked
Prasanna Malaiyandi:
about exfiltration monitoring.
Prasanna Malaiyandi:
I also, uh, like the idea, and we talked about it on a couple of
Prasanna Malaiyandi:
different episodes, this idea of, um, Something on your d n s side
Prasanna Malaiyandi:
that would notice when you start talking to really weird domain names.
Melissa Palmer:
Yeah, that's a
Melissa Palmer:
big one.
Melissa Palmer:
And there's all these lists.
Melissa Palmer:
Um, a lot of these researchers will just like tweet like, by the way, domains
Melissa Palmer:
looking a little hot, a little suss.
Melissa Palmer:
You might wanna block that stuff.
Melissa Palmer:
Um, so yeah,
Melissa Palmer:
there's
Melissa Palmer:
these lists of these like known bad domains and ips and stuff like that too.
Melissa Palmer:
W. Curtis Preston: Right.
Melissa Palmer:
Yeah.
Melissa Palmer:
And, and the other, uh, but I, I do think that if.
Melissa Palmer:
If you implement exfiltration monitoring, if you have a specific exfiltration
Melissa Palmer:
monitoring, I think you could stop mo or, or notice it quickly and stop it.
Melissa Palmer:
Um, but what I'm hearing from others is that not everybody
Melissa Palmer:
can afford such a thing.
Melissa Palmer:
Right.
Melissa Palmer:
Um, that, that,
Melissa Palmer:
lot of people can't afford it or they don't
Melissa Palmer:
have the skill set to build it
Melissa Palmer:
themselves, and you
Melissa Palmer:
really wanna be building and maintaining your own security systems.
Melissa Palmer:
Probably not.
Melissa Palmer:
W. Curtis Preston: No, but a lot of people do,
Melissa Palmer:
Yeah, because they have no choice.
Melissa Palmer:
It's better than nothing.
Melissa Palmer:
Like I've done
Melissa Palmer:
some weird stuff with some weird software because it was better than nothing.
Melissa Palmer:
Um, it, it, it's really a difficult point to be in.
Melissa Palmer:
And it's kind of like, you know, you all these people put out these, um, all
Melissa Palmer:
these, uh, security companies will do all this research of like, here's the
Melissa Palmer:
top ways they're getting in and blah, blah, blah, and all this kind of stuff.
Melissa Palmer:
Um, there's a lot of marketing that goes into it, but
Melissa Palmer:
there's a lot of truth, right?
Melissa Palmer:
So like, I.
Melissa Palmer:
. The big thing was the people for a long time, the people
Melissa Palmer:
let it in, you know, multi.
Melissa Palmer:
Where was it when, when this whole Cisco thing happened?
Melissa Palmer:
That was like, um, mfa, right?
Melissa Palmer:
They
Melissa Palmer:
got in through their mfa cuz they kept spamming of them.
Melissa Palmer:
Eventually they said
Melissa Palmer:
yes because like, stop calling me at 11
Melissa Palmer:
o'clock at night.
Melissa Palmer:
Um, . Now they're saying, oh, it's more vulnerabilities than people, right?
Melissa Palmer:
So honestly, I feel like the people might be easier to deal
Melissa Palmer:
with in the vulnerabilities.
Melissa Palmer:
I don't know.
Melissa Palmer:
Um, because then it's gonna be like testing the patches.
Melissa Palmer:
Can we patch everything?
Melissa Palmer:
Can we remediate everything?
Melissa Palmer:
It's, it's just like, what are the areas that you can find within your
Melissa Palmer:
own organization to be quick wins because you wanna prove that you can
Melissa Palmer:
win to your management so you get more money and can do more projects.
Melissa Palmer:
So you
Melissa Palmer:
need like a balance of quick wins to prove progress and high.
Melissa Palmer:
right?
Melissa Palmer:
What are the things that I can implement that will have the
Melissa Palmer:
most impact to reduce the risk?
Melissa Palmer:
And you're never gonna get the risk to zero.
Melissa Palmer:
I, there's um, a lot of people say that, like assume breach, right?
Melissa Palmer:
Like assume they're gonna get in so we
Melissa Palmer:
can do all this security stuff.
Melissa Palmer:
We can do all this backup.
Melissa Palmer:
And backup is basically assuming they're gonna get in, right?
Melissa Palmer:
Like, we're
Melissa Palmer:
not backing this stuff up cuz we think our security is so great.
Melissa Palmer:
Like we're assuming that it's the last line of defense, we're gonna need it.
Melissa Palmer:
Um, so a lot of it is just trying to mitigate what you.
Melissa Palmer:
in a way that makes sense for your organization, because we can't
Melissa Palmer:
have everybody working 20 hour days doing this either, or they're
Melissa Palmer:
gonna be too fried to make mistakes
Melissa Palmer:
and people are a problem.
Melissa Palmer:
Um, it, it's difficult.
Melissa Palmer:
It really is hard for any organization.
Melissa Palmer:
It's what can I do with what resources I have and cya, right?
Melissa Palmer:
If I'm, I'd probably be doing a lot of cya when, you know, they tell you
Melissa Palmer:
it's too expensive, you can't do that.
Melissa Palmer:
Well, you better have that documented.
Melissa Palmer:
So when you get ransomware, not like, Melissa, why
Melissa Palmer:
didn't you put in that security system?
Melissa Palmer:
You told me we didn't have the.
Melissa Palmer:
W. Curtis Preston: You don't know what's the current hot way that they're gonna,
Melissa Palmer:
they're, they're gonna attack you.
Melissa Palmer:
You can't stop all, uh, vulnerabilities.
Melissa Palmer:
You can't stop all stupid user things that stupid users are gonna do.
Melissa Palmer:
Um, and, um, And, and so you, I do think you, you have to assume breach, right?
Melissa Palmer:
And so you do have to do some things in your network that are going to
Melissa Palmer:
tell you when the bad guys are here.
Melissa Palmer:
Um, and that we stop it
Melissa Palmer:
as quickly as we can.
Melissa Palmer:
Can we make a movie about this?
Melissa Palmer:
Please?
Melissa Palmer:
Like that would be
Melissa Palmer:
really cool.
Melissa Palmer:
W. Curtis Preston: Nobody.
Melissa Palmer:
It'll only be
Melissa Palmer:
I'm gonna watch it
Melissa Palmer:
I'm gonna have chat, G b T, write me a movie.
Melissa Palmer:
I've had to write me ransomware, hallmark movies.
Melissa Palmer:
I kid you not, I'm just saying
Melissa Palmer:
have to entertain myself.
Melissa Palmer:
How now?
Prasanna Malaiyandi:
Wait,
Prasanna Malaiyandi:
W. Curtis Preston: my wife would
Prasanna Malaiyandi:
watch it if we make it a krama, make it a Korean drama.
Prasanna Malaiyandi:
Um,
Melissa Palmer:
be good.
Melissa Palmer:
Or like a Bollywood ransomware story.
Melissa Palmer:
W. Curtis Preston: yeah, I, there was a ransomware attack and a
Melissa Palmer:
krama that, uh, I dunno if you saw, there's one called Startup.
Melissa Palmer:
Um, and, uh, there, there's a, there's a, a really big
Melissa Palmer:
incubator in Korea in this movie.
Melissa Palmer:
Um, and this group of people, they, they do a startup there and.
Melissa Palmer:
Right at the crucial moment they get, they get a ransomware attack.
Melissa Palmer:
Um, and, and it was because some people did some dumb stuff.
Melissa Palmer:
They cut some corners, you know, and so they got
Prasanna Malaiyandi:
They got.
Prasanna Malaiyandi:
W. Curtis Preston: and the tech wasn't bad.
Prasanna Malaiyandi:
Right.
Prasanna Malaiyandi:
Um, there, I, I've actually seen a lot of, there was, uh, the good
Prasanna Malaiyandi:
doctor, that's the one with the guy that has, he's on the spectrum anyway.
Prasanna Malaiyandi:
They got, they got,
Prasanna Malaiyandi:
they got, they got a ransomware
Prasanna Malaiyandi:
attack.
Melissa Palmer:
Grey's
Melissa Palmer:
Anatomy
Melissa Palmer:
W. Curtis Preston: Uh, Grey's Anatomy did one.
Melissa Palmer:
Uh, the good doctor did one and the tech wasn't bad.
Melissa Palmer:
Right.
Melissa Palmer:
Uh, I just, I just hate it when it's like, like, when you watch, I dunno if you
Melissa Palmer:
ever watch, did you ever watch the Net?
Melissa Palmer:
Yeah.
Melissa Palmer:
Yeah.
Prasanna Malaiyandi:
Yep.
Prasanna Malaiyandi:
W. Curtis Preston: That tech
Melissa Palmer:
Look, all I know is I was, I don't know, maybe there's some
Melissa Palmer:
Hallmark movies going on in my house and it was on in the other room when I was
Melissa Palmer:
cooking dinner and my ears perked up.
Melissa Palmer:
Cause I heard something about an engineer and it was
Melissa Palmer:
the dude who was the engineer.
Melissa Palmer:
I was like, oh, I had hopes for this one.
Melissa Palmer:
So Hallmark, if you are listening to this, I would love to be your female
Melissa Palmer:
lead in a I think that would be so much.
Melissa Palmer:
Come on, come on.
Melissa Palmer:
Happy ending.
Melissa Palmer:
They, we,
Melissa Palmer:
we recover from
Melissa Palmer:
W. Curtis Preston: question is, how can you incorporate a small
Melissa Palmer:
town with a business that's, you know, on its last legs?
Melissa Palmer:
And
Melissa Palmer:
Totally.
Prasanna Malaiyandi:
That would
Prasanna Malaiyandi:
work.
Prasanna Malaiyandi:
Yeah.
Prasanna Malaiyandi:
W. Curtis Preston: instead of a ran, instead of a, uh, you know, a big
Prasanna Malaiyandi:
bookstore coming into town to shut down your little bookstore, it's
Prasanna Malaiyandi:
the ransomware attack shuts down the little, the little bookstore in
Prasanna Malaiyandi:
Or it could be at a doctor's
Prasanna Malaiyandi:
W. Curtis Preston: And,
Melissa Palmer:
Yeah.
Melissa Palmer:
Or local hospital.
Melissa Palmer:
We could
Melissa Palmer:
do local hospital.
Melissa Palmer:
That would be fine.
Melissa Palmer:
Small town hospital
Melissa Palmer:
only thing for miles.
Melissa Palmer:
W. Curtis Preston: It's, it's the big city girl that knows, um, that knows
Melissa Palmer:
about ransomware to rescue the little
Melissa Palmer:
big city girl, leaves her job at a software company, goes back
Melissa Palmer:
to her hometown to go out on her own.
Melissa Palmer:
just
Melissa Palmer:
W. Curtis Preston: Um, can you tell I've seen a Hallmark movie or show a show
Melissa Palmer:
I, it's my guilty pleasure.
Melissa Palmer:
I'm just gonna say that, uh, around Christmas there was a thing going around.
Melissa Palmer:
It was like Hallmark movie generator,
Melissa Palmer:
and I looked at it and I went, this is my life.
Melissa Palmer:
Oh my goodness.
Melissa Palmer:
I'm a Hallmark movie.
Melissa Palmer:
This is so cool.
Melissa Palmer:
W. Curtis Preston: They are kind of predictable as storylines, but, but yet
Melissa Palmer:
they've yet to have a ransomware attack.
Melissa Palmer:
Come on.
Melissa Palmer:
W. Curtis Preston: I'm behind that.
Melissa Palmer:
Yeah.
Melissa Palmer:
Well on that note, um, speaking of disappointing, um, you
Melissa Palmer:
know, if you folks like this
Melissa Palmer:
episode, I think there's
Melissa Palmer:
some,
Melissa Palmer:
I, uh, uh, I think, no, I think this was a good episode.
Melissa Palmer:
Um, and I like, I think, you know, we covered a lot.
Melissa Palmer:
We also had a little bit of fun.
Melissa Palmer:
I love that.
Melissa Palmer:
That's actually my favorite kind of episode where we, if it's just straight
Melissa Palmer:
talk the whole time, it's boring.
Melissa Palmer:
Um, and.
Melissa Palmer:
This was good.
Melissa Palmer:
Uh, good, good.
Melissa Palmer:
Smattering of both.
Melissa Palmer:
So, um, I think the one thing we're getting away from this is the best way
Melissa Palmer:
to respond to a ransomware attack is to respond to it before it happens.
Melissa Palmer:
Yes.
Melissa Palmer:
W. Curtis Preston: Right.
Melissa Palmer:
Talk to people, talk to, you know, talk to a incident response team.
Melissa Palmer:
A cyber insurance company's a good way to get one of those.
Melissa Palmer:
Um, you know, uh, do all the, the, those, the ransomware recovery scenarios, right?
Melissa Palmer:
All the different scenarios from a, the, the backup and recovery standpoint, right?
Melissa Palmer:
Um, and, um, and do some kind of monitoring, logging, logging.
Melissa Palmer:
Saving your logs, getting the logs, logging log.
Melissa Palmer:
I can't, I can't say that.
Melissa Palmer:
I can't
Melissa Palmer:
say it that
Prasanna Malaiyandi:
lugging.
Prasanna Malaiyandi:
W. Curtis Preston: Yeah, log, logging.
Prasanna Malaiyandi:
Logging, I can't, I don't know.
Prasanna Malaiyandi:
My tongue doesn't do that anyway.
Prasanna Malaiyandi:
Um, and then also some kind of monitoring for what's going on in your environment.
Prasanna Malaiyandi:
That would set off alarms when a ransomware.
Prasanna Malaiyandi:
You know, initial phase is happening.
Prasanna Malaiyandi:
Uh, cuz that's the key to start to stopping it, is to stop it.
Melissa Palmer:
Yep.
Melissa Palmer:
Get it.
Prasanna Malaiyandi:
Yeah,
Prasanna Malaiyandi:
W. Curtis Preston: absolutely.
Prasanna Malaiyandi:
Well, thanks Melissa
Melissa Palmer:
Thank you.
Melissa Palmer:
W. Curtis Preston: and uh, thanks Prasanna despite the fact that you were the
Melissa Palmer:
cause of all of our technical problems.
Prasanna Malaiyandi:
I'm sorry.
Prasanna Malaiyandi:
Hopefully not.
Melissa Palmer:
Sounds like a Hallmark
Prasanna Malaiyandi:
I
Melissa Palmer:
Sounds like a
Melissa Palmer:
Hallmark movie, just saying
Melissa Palmer:
W. Curtis Preston: We'll see this.
Prasanna Malaiyandi:
Thanks Curtis, and enjoy your vacation, Curtis, and
Prasanna Malaiyandi:
thanks Melissa for joining us again.
Melissa Palmer:
my pleasure.
Melissa Palmer:
W. Curtis Preston: We want to say thank you to our listeners as well.
Melissa Palmer:
It's been a great year, 2023.
Melissa Palmer:
So I hope you enjoyed this repeat episode.
Melissa Palmer:
That was so popular earlier in the year.
Melissa Palmer:
And again, we just want to thank you.
Melissa Palmer:
That is a wrap.