58 min

Ep. 153 After an Attack: Cyber Recovery Best Practices for State and Local Government Feds at the Edge

    • Technology

For the video of this podcast: After an Attack: Cyber Recovery Best Practices for State & Local Agencies.
Follow FedInsider on LinkedIn
Mike Tyson’s famous quote, “Everyone has a plan until they get punched in the face,” is a fitting analogy for the unpredictability and impact of a cyber-attack.
In this week’s Feds At The Edge podcast, we have a brutally honest conversation about a topic nobody wants to address: the step-by-step process of recovery from a cyber-attack.
We explore the importance of isolating the hypervisor to establish secure virtual domains and firewalls after an attack with Solomon Adote, Chief Security Officer with the Delaware Department of Technology and Information.
James Thurmond, Deputy CISO with Los Angeles County, introduces the concept of an emergency “break glass” account, that provides systems administrators with a reliable starting point for recovery. And Danny Page, Inside Sales Engineer from Rubrik, stresses understanding the full scope of an attack, including unnoticed data exfiltration, for effective recovery.
Detailed playbooks created from tabletop exercises should include contact information, an accurate inventory of all assets, and specific action steps to follow during an attack.
Tune in on your favorite podcasting platform to hear our experts discuss how balancing prevention and recovery skills is essential for managing sensitive data systems.

For the video of this podcast: After an Attack: Cyber Recovery Best Practices for State & Local Agencies.
Follow FedInsider on LinkedIn
Mike Tyson’s famous quote, “Everyone has a plan until they get punched in the face,” is a fitting analogy for the unpredictability and impact of a cyber-attack.
In this week’s Feds At The Edge podcast, we have a brutally honest conversation about a topic nobody wants to address: the step-by-step process of recovery from a cyber-attack.
We explore the importance of isolating the hypervisor to establish secure virtual domains and firewalls after an attack with Solomon Adote, Chief Security Officer with the Delaware Department of Technology and Information.
James Thurmond, Deputy CISO with Los Angeles County, introduces the concept of an emergency “break glass” account, that provides systems administrators with a reliable starting point for recovery. And Danny Page, Inside Sales Engineer from Rubrik, stresses understanding the full scope of an attack, including unnoticed data exfiltration, for effective recovery.
Detailed playbooks created from tabletop exercises should include contact information, an accurate inventory of all assets, and specific action steps to follow during an attack.
Tune in on your favorite podcasting platform to hear our experts discuss how balancing prevention and recovery skills is essential for managing sensitive data systems.

58 min

Top Podcasts In Technology

Apple Events (video)
Apple
TikTok
Catarina Vieira
Apple Events (audio)
Apple
Lex Fridman Podcast
Lex Fridman
Проекция бесконечности
Anton AnlimiT
Waveform: The MKBHD Podcast
Vox Media Podcast Network