Check out our companion blog!
Dec. 25, 2023

Get Ready Before You Get Got: Ransomware Response Planning

This timely episode features an in-depth discussion between cybersecurity expert Melissa Palmer (@vmiss) and hosts W. Curtis Preston and Prasanna Malaiyandi on the crucial role preparation and planning play in effectively responding to and recovering from the inevitable ransomware attack.

They stress that flying by the seat of your pants without an incident response plan when ransomware hits leads to chaotic, inefficient efforts and substantially higher costs. Melissa outlines pragmatic steps organizations should take before an attack to develop and test response playbooks, have partnerships in place with response firms, coordinate across internal teams, bolster detection capabilities, and harden backup/recovery mechanisms.

Curtis and Prasanna dive into real-world ransomware response scenarios to highlight the complexity organizations face in assessing the scope of damage from attacks and recalibrating restoration priorities. Melissa offers tips on creating robust processes to rebuild compromised environments quickly. They discuss table-top exercises as cost-efficient ways to uncover plan gaps and get stakeholders aligned on roles and timeline expectations.

With Melissa's depth of experience assisting ransomware victims, she provides unique insights into preparation best practices often neglected until the worst happens. For IT/security leaders looking to build organizational resilience against ransomware threats, this engaging episode delivers actionable advice on architecting defense-in-depth capabilities tailored to your business requirements.

Join us for a great episode!

Transcript
Speaker:

ATR2500x-USB Microphone & Logitech BRIO-2: If you're like the majority of people



Speaker:

I've talked to, you don't really have an incident response plan for ransomware.



Speaker:

That means you'll be flying by the seat of your pants when you get hit.



Speaker:

The good news is I have just the episode for you.



Speaker:

It's an extremely popular episode from earlier this year where we talk with



Speaker:

Melissa Palmer about what to put in your response plan and how to build it.



Speaker:

It was so popular that it makes the perfect episode for our winter break.



Speaker:

Even if you've heard it before, it's worth a second.



Speaker:

Listen.



Speaker:

If this is your first time listening to us.



Speaker:

Hi, I'm W Curtis Preston AKA Mr.



Speaker:

Backup.



Speaker:

And I've dedicated my career of over three decades to helping those of



Speaker:

you that have the job that I had when I first started the backup person.



Speaker:

This podcast is just for you.



Speaker:

We turned backup admins into cyber recovery heroes.



Speaker:

This is the backup wrap up.



Speaker:

ATR2500x-USB Microphone-1: Welcome to the show.



Speaker:

W. Curtis Preston: I'm your host, W Curtis Preston, aka a Mr.



Speaker:

Backup, and I have with me my super expensive vacation planner coordinator.



Speaker:

How's it going?



Speaker:

Prasanna



Prasanna Malaiyandi:

I'm doing well, Curtis, how are things going?



Prasanna Malaiyandi:

Are you excited?



Prasanna Malaiyandi:

We are.



Prasanna Malaiyandi:

I we're having technical difficulties, as you could tell.



Prasanna Malaiyandi:

We're trying to keep this real, but yes, doing this for the fifth ta,



Prasanna Malaiyandi:

fifth time, it's a little hard, but



Prasanna Malaiyandi:

W. Curtis Preston: I am excited, um, uh, and my wife is starting to get excited.



Prasanna Malaiyandi:

I started showing her some pictures a while ago and she's



Prasanna Malaiyandi:

been like downplaying it.



Prasanna Malaiyandi:

Like she doesn't want to get excited.



Prasanna Malaiyandi:

She wants to be sort of, Excited, but I needed her to prep for the vacation



Prasanna Malaiyandi:

because this is, so this is, we're going to the Maldives, uh, which for



Prasanna Malaiyandi:

those that don't know, is a series of islands off the southern coast of India.



Prasanna Malaiyandi:

And, um, and, and I'm on one of those islands and, and it's a tiny island that



Prasanna Malaiyandi:

literally we could walk from one end to the other in probably about 10 minutes.



Prasanna Malaiyandi:

Um, and.



Prasanna Malaiyandi:

We're staying in one of those things over the water,



Prasanna Malaiyandi:

Prasanna Malaiyandi: Oh, the Villas over the.



Prasanna Malaiyandi:

W. Curtis Preston: villas over the water with our, we have our own



Prasanna Malaiyandi:

pool, and then right on the other side of the pool is the ocean.



Prasanna Malaiyandi:

Um, I mean, it's



Prasanna Malaiyandi:

really, really cool.



Prasanna Malaiyandi:

Can I stow away in your luggage



Prasanna Malaiyandi:

W. Curtis Preston: Yeah, I mean, it looks really cool.



Prasanna Malaiyandi:

uh, we're very excited.



Prasanna Malaiyandi:

We're having our, a repeat guest and, um, we, we had her on, uh, a few



Prasanna Malaiyandi:

weeks ago and we got talking about ransomware, one of our favorite topics.



Prasanna Malaiyandi:

And we, we, we got into this phase where it was like, you know what?



Prasanna Malaiyandi:

That, that is a great conversation, but there's no way we could, we could



Prasanna Malaiyandi:

do it justice on that recording.



Prasanna Malaiyandi:

So it was, Hey, we're gonna have her come back.



Prasanna Malaiyandi:

And, uh, she is, uh, she's been in the industry for quite a while and she's been



Prasanna Malaiyandi:

specializing in, uh, she's done VMware.



Prasanna Malaiyandi:

Uh, she did.



Prasanna Malaiyandi:

Now she's, she's working, uh, Starting to specialize in security and ransomware.



Prasanna Malaiyandi:

So we're, uh, and she's the author of the vmiss.net blog, and we are



Prasanna Malaiyandi:

excited to have her on the podcast.



Prasanna Malaiyandi:

Again, Melissa Palmer, aka @vmiss.



Prasanna Malaiyandi:

How's it going?



Prasanna Malaiyandi:

you for



Melissa Palmer:

having me back.



Melissa Palmer:

It's going good.



Prasanna Malaiyandi:

I was surprised that you were like, Ooh, I'll



Prasanna Malaiyandi:

come back on the podcast after



Melissa Palmer:

yeah, that was, of course, when I come back



Prasanna Malaiyandi:

Well, thank you for



Melissa Palmer:

scare.



Melissa Palmer:

It takes a lot more.



Melissa Palmer:

You said it.



Melissa Palmer:

I've been in around this industry for a while.



Melissa Palmer:

It takes a lot more than that to scare me away after all these years.



Prasanna Malaiyandi:

And Curtis, I think, uh, now might be a good time



Prasanna Malaiyandi:

to put out our normal disclaimer.



Prasanna Malaiyandi:

W. Curtis Preston: Yeah, prasanna and I work for different companies.



Prasanna Malaiyandi:

Uh, he works for Zoom.



Prasanna Malaiyandi:

I work for Druva.



Prasanna Malaiyandi:

This is not a podcast of either company and the opinions that you hear are ours.



Prasanna Malaiyandi:

Also, be sure to rate us at, uh, Uh, rate this podcast.com/restore



Prasanna Malaiyandi:

and, um, if you wanna join the conversation, reach out to me.



Prasanna Malaiyandi:

By the way, I, I gotta give a bunch of ways cuz I, I got some



Prasanna Malaiyandi:

complaints and people say, well, I don't use Twitter anymore.



Prasanna Malaiyandi:

So how you give your Twitter address.



Prasanna Malaiyandi:

So my LinkedIn is, you know, linkedin.com/ally/mr.



Prasanna Malaiyandi:

Backup.



Prasanna Malaiyandi:

Uh, you can find me there.



Prasanna Malaiyandi:

Uh, you can find me on Facebook.



Prasanna Malaiyandi:

I'm on Facebook, Facebook Messenger, but my email is, uh, w Curtis Preston.



Prasanna Malaiyandi:

Uh, my Facebook is w Curtis Preston.



Prasanna Malaiyandi:

I'm pretty easy to find if you're looking for me.



Prasanna Malaiyandi:

Um, and reach out to me and we'll get you in on the, on the conversation.



Prasanna Malaiyandi:

Yeah.



Prasanna Malaiyandi:

Um, the, um, this, this thing of responding to a ransomware attack,



Prasanna Malaiyandi:

this, this is something I've been spending a lot of time on lately, uh,



Prasanna Malaiyandi:

because I've been, I'm, I'm working on writing my next book, which will be



Prasanna Malaiyandi:

about responding to ransomware attacks.



Prasanna Malaiyandi:

You know, one of the things that you said in the pre-call was that if, if



Prasanna Malaiyandi:

the first time you're thinking about responding to a ransomware attack is



Prasanna Malaiyandi:

after you got a ransomware attack,



Melissa Palmer:

Um,



Melissa Palmer:

W. Curtis Preston: it's not so good.



Melissa Palmer:

Right.



Melissa Palmer:

, there's a lot of, yeah.



Melissa Palmer:

In fact, when I was looking at the, sort of the outline that I've been



Melissa Palmer:

working on for the book, most of the outline is the first half , right?



Melissa Palmer:

Everything that you need to do before, right.



Melissa Palmer:

Um,



Melissa Palmer:

that's, it's like you can't just talk about ransomware



Melissa Palmer:

recovery, Right, Like, it, it, it's a hard topic to talk about because



Melissa Palmer:

you're like, there's all this other stuff that if you haven't done it, guess what?



Melissa Palmer:

You are not gonna be able to recover.



Melissa Palmer:

So we can't just talk about recovering.



Melissa Palmer:

It doesn't work that way.



Melissa Palmer:

W. Curtis Preston: Right.



Melissa Palmer:

It's sort of like I, I've made the joke, uh, a few times probably on



Melissa Palmer:

the pod where I've said, listen, you know, I've been in the backup



Melissa Palmer:

industry, you know, a long time.



Melissa Palmer:

I, I've decided to give up backups and I'm just gonna skip straight to restores.



Melissa Palmer:

Right?



Melissa Palmer:

You can't really , you can't really do that.



Melissa Palmer:

Just like I've also said that if I'd have known how great grandkids were,



Melissa Palmer:

I would've just gone straight to them.



Melissa Palmer:

Um, but not, not really



Melissa Palmer:

Prasanna Malaiyandi: It's not how it works.



Melissa Palmer:

Yeah.



Melissa Palmer:

W. Curtis Preston: Yeah.



Melissa Palmer:

It is a really



Melissa Palmer:

good analogy though.



Melissa Palmer:

It really



Melissa Palmer:

W. Curtis Preston: Yeah, it is, it is.



Melissa Palmer:

By the way, you want a little, little sad thing.



Melissa Palmer:

So my granddaughter and her mother and, and her husband,



Melissa Palmer:

uh, are, this is their last day



Prasanna Malaiyandi:

Oh, I was gonna ask you about



Prasanna Malaiyandi:

W. Curtis Preston: been living here for a while, and they're moving out tomorrow.



Prasanna Malaiyandi:

So,



Prasanna Malaiyandi:

Hmm.



Prasanna Malaiyandi:

W. Curtis Preston: little sad moment.



Prasanna Malaiyandi:

Little sad moment.



Prasanna Malaiyandi:

No.



Prasanna Malaiyandi:

W. Curtis Preston: Um, but, uh, anyway, so, you know, sorry to bring that down.



Prasanna Malaiyandi:

So let's talk about what, what do you think, Melissa?



Prasanna Malaiyandi:

Let, let's sort of go through those things that we really needed to have done before.



Melissa Palmer:

Uh, well, lemme, lemme try to set the stage a little bit.



Melissa Palmer:

Like, does everybody remember like, the disaster recovery tests, like



Melissa Palmer:

back in the day, you go to the colo, you got the checkbook, the.



Melissa Palmer:

the



Melissa Palmer:

Clipboard you make, the checkbox isn't like, I don't know, you play



Melissa Palmer:

doom for a while and eat some food.



Melissa Palmer:

Someone restores a server and it's like,



Melissa Palmer:

well, it kind of worked and we're good.



Melissa Palmer:

Yeah,



Melissa Palmer:

that's how old I am.



Melissa Palmer:

Um, so and then you're like, oh, it kind of worked.



Melissa Palmer:

So we passed our d r test, but we can't actually recover.



Melissa Palmer:

Right?



Melissa Palmer:

So what you need to do is actually do a ransomware recovery test where



Melissa Palmer:

you actually recover everything.



Melissa Palmer:

There's a novel concept, and when you do that, you're gonna figure out all the.



Melissa Palmer:

but you didn't do cuz it's not gonna work or something's not gonna



Melissa Palmer:

whatever.



Melissa Palmer:

But it, it's, you know, talking from the backup lens cuz I was



Melissa Palmer:

at Veeam for quite some time.



Melissa Palmer:

Um, something I talked a lot about with Veeam customers was, you know, trying to



Melissa Palmer:

understand the whole recovery process.



Melissa Palmer:

Cuz if I'm the backup admin and we get ransomware, I don't just



Melissa Palmer:

go start restoring stuff all over.



Melissa Palmer:

Like that's not what happens.



Melissa Palmer:

It's not like, oh no, right somewhere tech, let me start restoring servers.



Melissa Palmer:

We'll



Melissa Palmer:

be back online in 20



Melissa Palmer:

minutes.



Melissa Palmer:

Like it doesn't work that way.



Melissa Palmer:

, you have to figure out what happened.



Melissa Palmer:

Before you can start restoring, you have to figure out what happened.



Melissa Palmer:

You have to figure out if the threat actors are still around.



Melissa Palmer:

You have to understand what was impacted.



Melissa Palmer:

I have heard a lot of people say, um, oh, well, we treat ransomware



Melissa Palmer:

different and we just recover in place.



Melissa Palmer:

So we're good to go.



Melissa Palmer:

And I'll go



Melissa Palmer:

back to the little VMware.



Melissa Palmer:

Yeah, I'll go back to the VMware ransomware thing.



Melissa Palmer:

Well, if your VMware environment is ransomware, guess what?



Melissa Palmer:

You're not recovering in place cuz there's nowhere to recover to.



Melissa Palmer:

Uh, so it's understanding all those different things.



Melissa Palmer:

You need to have some kind of understanding of what happened



Melissa Palmer:

before you can recover.



Melissa Palmer:

And that is generally driven by the incident response process, which is



Melissa Palmer:

gonna be driven by the security team.



Melissa Palmer:

So again, if you haven't talked to the security team before,



Melissa Palmer:

ransomware has attacked you.



Melissa Palmer:

You're gonna have a bad time.



Prasanna Malaiyandi:

Or vice versa, if the security team hasn't talked to you about



Prasanna Malaiyandi:

how backup integrates into that process.



Melissa Palmer:

that's really scary.



Melissa Palmer:

That's really, That's really, that's really, disturbing.



Melissa Palmer:

Those are actually



Melissa Palmer:

really even, I think that's



Melissa Palmer:

scarier.



Melissa Palmer:

W. Curtis Preston: I think it's, it's a, it's a combination, right?



Melissa Palmer:

Well, you know, uh, yesterday, I think that was yesterday, we recorded



Melissa Palmer:

a, a great podcast, uh, by the way, with Tom from Gestalt, um, that,



Melissa Palmer:

that, uh, net, uh @networkingnerd.



Melissa Palmer:

Yeah.



Melissa Palmer:

and he, uh, we were talking a lot about the networking side of the, the



Melissa Palmer:

response, right?



Melissa Palmer:

Shutting down things.



Melissa Palmer:

Um, and, and using a combination of technologies, many of which are easier



Melissa Palmer:

to use if you, if you set them up front.



Melissa Palmer:

Right.



Melissa Palmer:

And, uh, talking about things like VLANs and, uh, you know, like one of



Melissa Palmer:

the things we talked about was having a VLAN for all of your desktops and



Melissa Palmer:

laptops, so that if you want to stop everybody from doing anything, you



Melissa Palmer:

just shut off those VLANs and boom.



Melissa Palmer:

Um, there, you know, instead of having to notify 5,000 users, hey, stop doing



Melissa Palmer:

anything, you just shut off their network.



Melissa Palmer:

So they can't, they can't do anything.



Melissa Palmer:

And then if stuff is still happening, , um, well, it's not the users,



Melissa Palmer:

right?



Melissa Palmer:

It's, it's malware,



Melissa Palmer:

right?



Prasanna Malaiyandi:

back to segmentation.



Prasanna Malaiyandi:

W. Curtis Preston: know, yeah, the, the network segmentation and the, the



Prasanna Malaiyandi:

security part, I think, um, What, what, what role do you think the, I'll ask you



Prasanna Malaiyandi:

what you think before I say what I think



Prasanna Malaiyandi:

So what role do you think cyber insurance companies and then the, the companies



Prasanna Malaiyandi:

that they can put you in touch with?



Prasanna Malaiyandi:

The, the



Melissa Palmer:

Cyber insurance is becoming more and more interesting



Melissa Palmer:

cuz it gets to the point where they hand you the list of things you



Melissa Palmer:

need to do before they'll issue your policy and guess what you're



Melissa Palmer:

gonna probably be able to cover anyway.



Melissa Palmer:

Um, but a big part of, I've seen in a lot of policies lately is



Melissa Palmer:

having, um, basically an instant response from on retainer ready to go



Melissa Palmer:

as part of your policy.



Melissa Palmer:

And



Melissa Palmer:

I think that is invaluable.



Melissa Palmer:

I.



Melissa Palmer:

, everybody should have some kinda relationship with an IR firm



Melissa Palmer:

if you can't do it in house.



Melissa Palmer:

And uh, even if you can, right?



Melissa Palmer:

Sometimes you do still need that outside perspective.



Melissa Palmer:

I know a lot of larger orgs are like, no, no, we do our own ir, well, you do



Melissa Palmer:

your own ir, but you're not dealing with ransomware every day and these people are



Melissa Palmer:

so you might want a little bit of help.



Melissa Palmer:

W. Curtis Preston: Yeah.



Melissa Palmer:

Yeah.



Melissa Palmer:

Um, you know, um, I hate to do it, but a another, another movie reference.



Melissa Palmer:

I just saw the , the movie plane, and you know, the plane goes down in the



Melissa Palmer:

middle of nowhere and they brought in the guy, they brought in the incident



Melissa Palmer:

response guy basically once he showed up.



Melissa Palmer:

Right.



Melissa Palmer:

See, there's a movie reference for everything,



Melissa Palmer:

I haven't, I



Melissa Palmer:

can't tell you the last movie I've watched.



Melissa Palmer:

I really can't.



Melissa Palmer:

I don't



Melissa Palmer:

W. Curtis Preston: I can, I can, I can pull up my app, uh,



Melissa Palmer:

cuz I have the Regal Unlimited.



Melissa Palmer:

tell you the last thing I watched.



Melissa Palmer:

I can't tell you the last movie I watched, cuz I don't remember.



Melissa Palmer:

W. Curtis Preston: I, I, yeah, I, I saw like three this week.



Melissa Palmer:

So



Melissa Palmer:

in, in the theaters



Prasanna Malaiyandi:

so back to the cyber insurance from movies.



Prasanna Malaiyandi:

Uh,



Prasanna Malaiyandi:

I, yes.



Prasanna Malaiyandi:

Yeah.



Prasanna Malaiyandi:

No, but, but, but I think, well, this is one of the points that I remember



Prasanna Malaiyandi:

because remember when Tony came on from SPECT Logic, Curtis, and he was like,



Prasanna Malaiyandi:

oh my God, they got hit with ransomware.



Prasanna Malaiyandi:

And he's like, just the previous month they had signed up for cyber insurance.



Prasanna Malaiyandi:

They had an IR firm come in, give them sort of the list of, Hey, here's



Prasanna Malaiyandi:

everything you need to do to help.



Prasanna Malaiyandi:

Right.



Prasanna Malaiyandi:

And he was like, that was probably the most valuable thing of that sort of



Prasanna Malaiyandi:

cyber insurance policy was having the experts who could walk you through.



Prasanna Malaiyandi:

W. Curtis Preston: And it, and it wasn't even like he, he was just



Prasanna Malaiyandi:

lucky enough to have already, you know, contracted with them.



Prasanna Malaiyandi:

Right.



Prasanna Malaiyandi:

But the best I think would be to



Prasanna Malaiyandi:

, well, not that you would know this, but to do it not a month in advance, but



Prasanna Malaiyandi:

obviously way in



Melissa Palmer:

right.



Melissa Palmer:

W. Curtis Preston: to get, and to give you some time to work with the incident



Melissa Palmer:

response team and to make sure that you are doing the things that they want



Melissa Palmer:

but that's like that's like the problem, right?



Melissa Palmer:

Like it's not, if it's when, and you don't know when.



Melissa Palmer:

It could be tomorrow, it could be next week, it could be next month.



Melissa Palmer:

It could be next year.



Melissa Palmer:

Like you don't



Melissa Palmer:

W. Curtis Preston: It could have been three weeks ago.



Melissa Palmer:

and you just haven't realized it yet, right?



Melissa Palmer:

W. Curtis Preston: Yeah.



Prasanna Malaiyandi:

Do it today.



Prasanna Malaiyandi:

Yeah.



Melissa Palmer:

my favorite.



Melissa Palmer:

W. Curtis Preston: Yeah.



Melissa Palmer:

Uh, so, which is why it doesn't matter when you invent a time machine.



Melissa Palmer:

You know, I have bad news to you.



Melissa Palmer:

W. Curtis Preston: What



Melissa Palmer:

I haven't invented a time machine



Melissa Palmer:

because there are certain



Melissa Palmer:

points I've always promised to myself.



Melissa Palmer:

If I invented the time machine, I would go back to this point and tell



Melissa Palmer:

myself I invented the time machine.



Melissa Palmer:

And if that hasn't happened, I haven't invented it because



Melissa Palmer:

time is not linear, right?



Melissa Palmer:

So I haven't invented a time machine.



Melissa Palmer:

I'm very upset about that.



Melissa Palmer:

W. Curtis Preston: Yeah.



Melissa Palmer:

Me neither.



Melissa Palmer:

Um, but, um, well, it's been a weird, it's been, we've been jumping in and out



Melissa Palmer:

of the topic here on this podcast, but,



Prasanna Malaiyandi:

Incident response.



Prasanna Malaiyandi:

W. Curtis Preston: yeah.



Prasanna Malaiyandi:

So we, we, we get the cyber insurance folks because I



Prasanna Malaiyandi:

think in the, in the initial.



Prasanna Malaiyandi:

Ransomware phase, what people thought of cyber insurance was just a



Prasanna Malaiyandi:

company to pay their ransom for you, and that they're definitely saying



Prasanna Malaiyandi:

they're not interested in it anymore.



Melissa Palmer:

Yeah.



Melissa Palmer:

And there's



Melissa Palmer:

more costs beyond the ransom, right?



Melissa Palmer:

So



Melissa Palmer:

you paid the ransom, but what about everything else?



Melissa Palmer:

Um, that's the thing.



Melissa Palmer:

And policies have changed over time, like, back in the day a couple years ago, right?



Melissa Palmer:

Like before the pandemic, uh, it was like easy to get cyber insurance.



Melissa Palmer:

Like, oh yeah, I'll take a cyber insurance policy for 5 million, please, whatever.



Melissa Palmer:

And



Melissa Palmer:

now it's hard.



Melissa Palmer:

And if you do actually use your, I've seen a lot of cases where if you



Melissa Palmer:

actually use the insurance policy,



Melissa Palmer:

guess what?



Melissa Palmer:

They don't necessarily drop you, but guess what Your deductible co becomes.



Melissa Palmer:

What they paid for your last ransomware attack, right?



Melissa Palmer:

So if I had to pay 2.5 million, guess what?



Melissa Palmer:

I now have a 2.5 million deductible for my next attack because



Melissa Palmer:

let's face it.



Melissa Palmer:

We get IR in, right?



Melissa Palmer:

We figured out what happened, we have to recovered, and then there's a whole



Melissa Palmer:

stage where we have to do a postmortem, figure out how they got in, if they're



Melissa Palmer:

still in and close up the gaps.



Melissa Palmer:

That doesn't always happen cuz people are so, like, ohms are back, we're good to go.



Melissa Palmer:

Happy day, happy



Melissa Palmer:

day.



Melissa Palmer:

And they get hit again



Melissa Palmer:

because they never fixed the way they got in in the first place.



Melissa Palmer:

W. Curtis Preston: What, what do you think about the idea of.



Melissa Palmer:

And again, this would be driven by management.



Melissa Palmer:

And you know, a lot of times, like you said, management isn't necessarily



Melissa Palmer:

at that moment thinking about the the best way to do something.



Melissa Palmer:

They just wanna do the fastest way to do something.



Melissa Palmer:

right?



Melissa Palmer:

So another thing I've been looking into is the idea of wouldn't the best



Melissa Palmer:

practice to be to figure out how they got in before you do the recovery,



Melissa Palmer:

before you turn everything back on.



Melissa Palmer:

Yeah.



Melissa Palmer:

And that, that's where the IR firms come in, because.



Melissa Palmer:

they'll kind of get in and they'll be able to do that.



Melissa Palmer:

They'll be able to say like, you guys are so messed up.



Melissa Palmer:

You didn't have any logging unabled anywhere.



Melissa Palmer:

Like we, we can't tell right now.



Melissa Palmer:

Right?



Melissa Palmer:

It really depends on what happens in that first phase.



Melissa Palmer:

Um,



Melissa Palmer:

W. Curtis Preston: Yeah.



Melissa Palmer:

and it comes back to kind of getting ready for the



Melissa Palmer:

attack and what kind of security practice you have in some places.



Melissa Palmer:

Yeah.



Melissa Palmer:

We could see, people can figure out, uh, throw in a tool and say, yeah, guess what?



Melissa Palmer:

They came in here.



Melissa Palmer:

We know we're good to go.



Melissa Palmer:

Other times they might not find it just



Melissa Palmer:

because there was never.



Prasanna Malaiyandi:

they came in.



Prasanna Malaiyandi:

They went out before you even knew



Prasanna Malaiyandi:

or nothing was



Prasanna Malaiyandi:

W. Curtis Preston: under



Melissa Palmer:

or we didn't, you know, we didn't have logging



Melissa Palmer:

on or whatever.



Melissa Palmer:

Or they turned something off or,



Melissa Palmer:

W. Curtis Preston: Logging is a beautiful thing and, and also



Melissa Palmer:

a system to get those logs off



Melissa Palmer:

yeah, that's what



Melissa Palmer:

people like



Melissa Palmer:

forget about, like who cares about the logs, like whatever their logs.



Melissa Palmer:

No, you're, you're going to care about the



Melissa Palmer:

logs someday, I promise you.



Melissa Palmer:

W. Curtis Preston: Yeah, I mean, even if it's something as simple of making



Melissa Palmer:

sure that the logs are represented as text somewhere, that is then



Melissa Palmer:

backed up by the backup system so that you can restore all of them.



Melissa Palmer:

That's basic, but there are systems that you can buy that



Melissa Palmer:

will just automatically, uh,



Melissa Palmer:

exfiltrate all of those logs for you.



Melissa Palmer:

Yeah.



Melissa Palmer:

Yeah.



Prasanna Malaiyandi:

I wanna go back to a point you made earlier, Melissa, about



Prasanna Malaiyandi:

sort of, okay, how do you make sure that you fix the things that broke so everyone



Prasanna Malaiyandi:

isn't like, Hey, my VMs are back up.



Prasanna Malaiyandi:

I don't need to worry about these things anymore.



Prasanna Malaiyandi:

Have you heard any cases where, I know sometimes executives have



Prasanna Malaiyandi:

sort of financial liability, right?



Melissa Palmer:

I've heard of that trend, right?



Melissa Palmer:

Like your guess what your bonus is tied to if you get ransomware or not, and how you.



Melissa Palmer:

And stuff like that, that's starting to happen in some places.



Melissa Palmer:

Um, but a lot of it comes down to maybe the processes were



Melissa Palmer:

never clearly defined upfront.



Melissa Palmer:

Right.



Melissa Palmer:

And that's where a lot of the cyber insurance stuff can



Melissa Palmer:

actually come in and help.



Melissa Palmer:

Well, they'll be like, you need to show us your response process.



Melissa Palmer:

And they'll be like, here you go.



Melissa Palmer:

And they'll be like, okay, so where's the rest of it?



Melissa Palmer:

Or something like that, right?



Melissa Palmer:

Like, what, what



Melissa Palmer:

happened?



Melissa Palmer:

Like, this is it.



Melissa Palmer:

Like here's



Melissa Palmer:

a page.



Melissa Palmer:

Like it's not gonna work.



Melissa Palmer:

Um, and again, it comes back to.



Melissa Palmer:

the old school DR test.



Melissa Palmer:

Like there needs to be ransomware recovery tests and postmortems of



Melissa Palmer:

that ransomware recovery test, right?



Melissa Palmer:

Like y'all need to get in room, figure out what worked, what didn't



Melissa Palmer:

work.



Melissa Palmer:

W. Curtis Preston: Having done the old school DR test, I'm curious as to how



Melissa Palmer:

they do a ransomware recovery test.



Melissa Palmer:

Because one of the hardest parts of a ransomware recovery is that the



Melissa Palmer:

attacker is there is still attacking, like with a dr, you just say,



Melissa Palmer:

okay, those six systems are dead.



Melissa Palmer:

So, yeah.



Melissa Palmer:

So



Melissa Palmer:

here's where it



Melissa Palmer:

gets complicated.



Melissa Palmer:

You need to test multiple types of recoveries, right?



Melissa Palmer:

So maybe I'm recovering, please.



Melissa Palmer:

I, I can't.



Melissa Palmer:

, I will vomit in my mouth if I say maybe I'm recovering in place.



Melissa Palmer:

I can't even like say that.



Melissa Palmer:

So we're not gonna say that, but like maybe I'm going to my second site.



Melissa Palmer:

Maybe I'm going to a warm site.



Melissa Palmer:

Maybe I'm going to a hot site.



Melissa Palmer:

Maybe I'm going to a public cloud.



Melissa Palmer:

Maybe I'm going to a VMware cloud.



Melissa Palmer:

You gotta test all those, right?



Melissa Palmer:

Because



Melissa Palmer:

you don't know where you're going until that incident response



Melissa Palmer:

phase starts, especially when law enforcement gets involved, right?



Melissa Palmer:

So let's say stuff's really bad, the FBI comes, and guess what?



Melissa Palmer:

We are quarantining your whole data center while we investigate.



Melissa Palmer:

Then what do you do?



Prasanna Malaiyandi:

Yeah.



Prasanna Malaiyandi:

You're down for business, otherwise,



Melissa Palmer:

do?



Melissa Palmer:

No, you go to public cloud, you go to um, a service provider, you go someplace else.



Melissa Palmer:

So you have to have all that ironed out ahead of time.



Melissa Palmer:

You have to know that there's different considerations for recovery from



Melissa Palmer:

ransomware attack than a traditional



Melissa Palmer:

disaster.



Melissa Palmer:

So I guess, you know, from a traditional disaster, like what if



Melissa Palmer:

the zombies eat both data centers,



Melissa Palmer:

right?



Melissa Palmer:

Then you would still need to go to the



Prasanna Malaiyandi:

but people probably aren't thinking about that though, right?



Prasanna Malaiyandi:

The fact that, hey, maybe the F B I will come quarantine, right?



Prasanna Malaiyandi:

Do you have your backups offsite?



Prasanna Malaiyandi:

Do you have it in someplace that you can bring it up?



Prasanna Malaiyandi:

And like you mentioned earlier, Melissa, it's like things you should plan for ahead



Prasanna Malaiyandi:

of time before you get to the point where you are trying to recover from ransomware.



Melissa Palmer:

Exactly.



Melissa Palmer:

And again, unless an organization, so I have a couple of examples



Melissa Palmer:

of, I don't wanna say Dr.



Melissa Palmer:

Done wrong, but uh, I worked for an uh, company when I was



Melissa Palmer:

an intern on Wall Street and everything was in New York City.



Melissa Palmer:

and nine 11 happened and they were a block from the World Trade Center.



Melissa Palmer:

That's what they couldn't, they couldn't do anything like they were done.



Melissa Palmer:

Right.



Melissa Palmer:

Like they were just done.



Melissa Palmer:

So they like rebuilt their systems in a hotel room someplace.



Melissa Palmer:

Right.



Melissa Palmer:

And that kicked off a huge project to say, we actually need a second data



Melissa Palmer:

center and it needs to be not around here.



Melissa Palmer:

Right.



Melissa Palmer:

Um, I'm also on the east coast, right?



Melissa Palmer:

So New York, hurricane Sandy, we had this hurricane roll through.



Melissa Palmer:

And again, like the data centers are like 20 miles from each other.



Melissa Palmer:

Guess.



Melissa Palmer:

, they both tanked.



Melissa Palmer:

Um, so things like that.



Melissa Palmer:

So until an organization actually has something happen to them, it's really,



Melissa Palmer:

and here's the issue, the, the, the difference between disaster recovery



Melissa Palmer:

and ransomware recovery, when we talk about it, traditional disaster



Melissa Palmer:

recovery stuff, until it happens, it's easy to accept the risk, right?



Melissa Palmer:

Well, you know what?



Melissa Palmer:

It's cheaper for us to just like recover from this disaster and be down for



Melissa Palmer:

two weeks than it is to actually put everything into place where we build a



Melissa Palmer:

second site, yada, yada, yada, yada, et.



Melissa Palmer:

that's because the risk is so low, right?



Melissa Palmer:

And there's all kinds of equations for



Melissa Palmer:

this in, you know, cybersecurity and stuff like that.



Melissa Palmer:

But when you change it to ransomware, the risk is going to, it's going to



Melissa Palmer:

happen like a probability of one.



Melissa Palmer:

It



Melissa Palmer:

will happen.



Melissa Palmer:

Um, and that's what people don't understand.



Melissa Palmer:

Like this is going to happen.



Melissa Palmer:

It's not like you can say like, well, you know, we haven't had a hundred



Melissa Palmer:

years storm ever, so we'll be fine.



Melissa Palmer:

Um, it's different like that.



Melissa Palmer:

And a lot of people, I've actually seen a huge uptick in people getting.



Melissa Palmer:

I don't think a lot of people are where they need to be.



Melissa Palmer:

Um, but I think as people get ready and it gets harder and harder to attack



Melissa Palmer:

people because they've put like some semblance of security in it, right?



Melissa Palmer:

You're gonna go for the low-hanging fruit, you're gonna see the people



Melissa Palmer:

who aren't ready get hit harder and you're just gonna see more and more



Melissa Palmer:

attacks and the threat actors are gonna have to get more creative.



Prasanna Malaiyandi:

So here's a question for you.



Prasanna Malaiyandi:

Normally when we think about backup and recovery, right, it's always



Prasanna Malaiyandi:

about restoring your data or your application because there might be



Prasanna Malaiyandi:

a hardware failure, an application fault, user error, et cetera.



Prasanna Malaiyandi:

Sometimes people talk about ransomware in the same context as



Prasanna Malaiyandi:

disaster recovery and sort of those



Melissa Palmer:

Ransomware is a disaster.



Melissa Palmer:

I



Prasanna Malaiyandi:

but, but here's the question though, Melissa



Prasanna Malaiyandi:

is, Like you had just mentioned, it's not the same as a flood or a



Prasanna Malaiyandi:

hurricane or something like that.



Prasanna Malaiyandi:

And so are we kind of pushing ourselves and kind of giving people



Prasanna Malaiyandi:

the false impression that it is similar to those other disasters



Prasanna Malaiyandi:

and things that they shouldn't worry about versus we should be treating



Prasanna Malaiyandi:

it similar to like an application failure or user failure and treating it



Prasanna Malaiyandi:

similar.



Prasanna Malaiyandi:

It's like more towards that side of the spectrum than this side.



Melissa Palmer:

and you know, that all falls under DR



Melissa Palmer:

anyway, like hardware failure



Melissa Palmer:

and all that kind of stuff.



Melissa Palmer:

Um, and again, in a lot of those cases, it's easy to say, well, you know what?



Melissa Palmer:

I don't really want a second site.



Melissa Palmer:

It's



Melissa Palmer:

just cheaper to deal with the hardware.



Melissa Palmer:

It'll take we'll rush order.



Melissa Palmer:

I was in a situation at a company, we'll just rush order at a new array from



Melissa Palmer:

E M C that will solve our problems.



Melissa Palmer:

Like that was the plan and that happened.



Melissa Palmer:

Um, so crazy stuff like that.



Melissa Palmer:

But the problem, why I like to make the analogy so much is the problem



Melissa Palmer:

is when you tell someone that you have to get ready to recover from



Melissa Palmer:

ransomware, they're just like, I don't.



Melissa Palmer:

what to do.



Melissa Palmer:

You have to put it in some context that kind of makes sense.



Melissa Palmer:

I mean, disaster recovery is definitely like not sexy, even though



Melissa Palmer:

I've done it most in my career.



Melissa Palmer:

Um, but it's something that everybody has an inkling about at least, right?



Melissa Palmer:

Everybody kind of knows that there is usually a DR test once or twice or year a



Melissa Palmer:

minimum.



Melissa Palmer:

Um, so it's a way, it's a starting



Melissa Palmer:

point, right?



Melissa Palmer:

It's not your final destination, but it's a starting



Melissa Palmer:

point.



Melissa Palmer:

It's a.



Melissa Palmer:

place to start context.



Melissa Palmer:

Maybe you have some playbook, some processes that we can leverage to go build



Melissa Palmer:

on top of that and say, okay, so how do we make sure that we can recover now under



Melissa Palmer:

any



Melissa Palmer:

W. Curtis Preston: I like to, I like to say that it's a subset, right?



Melissa Palmer:

A DR is a subset of a ransomware recovery, but there's so much else, right?



Melissa Palmer:

And the big thing, the but, and I think you said it already, Prasanna, but the



Melissa Palmer:

big thing to me, the difference between a DR and a ransomware attack, um, is



Melissa Palmer:

that the, the disaster isn't, Right.



Melissa Palmer:

You're, you're still right



Melissa Palmer:

that the disaster never



Melissa Palmer:

W. Curtis Preston: a flood is gone, you're like, okay, all



Melissa Palmer:

these servers got wiped out.



Melissa Palmer:

So those are the



Melissa Palmer:

because the threat is still there.



Melissa Palmer:

Just because you



Melissa Palmer:

recovered from the ransomware attacked doesn't mean they're not



Melissa Palmer:

gonna hit you again, or someone else



Melissa Palmer:

isn't gonna hit



Melissa Palmer:

W. Curtis Preston: Right.



Melissa Palmer:

Well, and, and how do you even know,



Melissa Palmer:

um, You know, like when you, when when a hurricane wipes out a data



Melissa Palmer:

center, you're like, okay, those are the servers we need to restore.



Melissa Palmer:

But how do, when you walk into your data center and there's a



Melissa Palmer:

ransomware attack going on, how do you even know which servers have



Melissa Palmer:

been affected or not affected?



Melissa Palmer:

Right.



Melissa Palmer:

That's, that is a big part of it.



Prasanna Malaiyandi:

Yeah, and I guess the other thing is even like you



Prasanna Malaiyandi:

might see the active infection, like things are being encrypted, et cetera,



Prasanna Malaiyandi:

but it might just be lying silently.



Prasanna Malaiyandi:

Right.



Prasanna Malaiyandi:

We've talked about dwell time in the past, right.



Prasanna Malaiyandi:

Where it's



Melissa Palmer:

chill.



Melissa Palmer:

They just chill in there for a while.



Melissa Palmer:

Like, who knows?



Melissa Palmer:

Um, I, I can't remember off the top of my head, but I remember reading like a big



Melissa Palmer:

name breach or something like that, or a big name attack, and they said they were



Melissa Palmer:

in the network for like six months or



Prasanna Malaiyandi:

I think Solar Winds was like



Melissa Palmer:

was it?



Melissa Palmer:

I don't remember.



Melissa Palmer:

But I remember reading a couple of them where they've been in



Melissa Palmer:

there a significant period of time and who knows what they're doing



Melissa Palmer:

there, right?



Melissa Palmer:

Like who knows



Melissa Palmer:

unless you catch them.



Melissa Palmer:

So it's about



Melissa Palmer:

W. Curtis Preston: yeah.



Melissa Palmer:

The meantime is something like 60 days actually is what I, what I read.



Melissa Palmer:

Um,



Melissa Palmer:

be the worst ransomware person.



Melissa Palmer:

I'd be like, let's go, let's go.



Melissa Palmer:

It's like, no, you're not supposed to do that.



Melissa Palmer:

You gotta



Melissa Palmer:

take your time and traverse



Melissa Palmer:

through the network and get ad.



Melissa Palmer:

I'd be like, let's go encrypt VMware.



Melissa Palmer:

Let's go.



Melissa Palmer:

I'd be caught so fast.



Melissa Palmer:

Or maybe I wouldn't, maybe I.



Prasanna Malaiyandi:

You're only caught if someone's monitoring and watching.



Prasanna Malaiyandi:

Right Melissa?



Melissa Palmer:

Right.



Melissa Palmer:

And you need



Melissa Palmer:

to be looking for the right things.



Melissa Palmer:

W. Curtis Preston: Yeah.



Melissa Palmer:

As soon as you encrypt a, a vm, uh, you're gonna set off alarm or two.



Melissa Palmer:

Um, but I, I think you encrypt, I think you encrypt a lot of



Melissa Palmer:

files that no one's looking at.



Melissa Palmer:

Right.



Melissa Palmer:

But the moment you start



Melissa Palmer:

Once you hit the the thing,



Melissa Palmer:

the only thing is you'll hit.



Melissa Palmer:

You'll hopefully you'll be caught as soon as you start encrypting the VMs.



Melissa Palmer:

You do them all at once, so it doesn't matter.



Melissa Palmer:

W. Curtis Preston: Yeah.



Melissa Palmer:

Right.



Melissa Palmer:

Cuz it's,



Melissa Palmer:

I got all of 'em.



Melissa Palmer:

It doesn't matter that you caught me doing the first one, I did them all.



Melissa Palmer:

Um, but yeah, so generally they're in their wreaking havoc, steal maybe



Melissa Palmer:

exfiltrating data, doing some stuff before they go encryption habit.



Melissa Palmer:

Or maybe like, I've heard cases recently where they don't even



Melissa Palmer:

bother, like encrypting stuff.



Melissa Palmer:

They're just stealing data at this point and



Melissa Palmer:

be like, by the way, look what we have.



Prasanna Malaiyandi:

Is that easier by the way, to steal data?



Prasanna Malaiyandi:

Because it seems that you can sort of fly under the radar if you just steal



Prasanna Malaiyandi:

data because people will probably, maybe they notice, maybe they don't,



Prasanna Malaiyandi:

but it's not as obvious as, say,



Melissa Palmer:

It



Melissa Palmer:

is definitely not as obvious as encrypting stuff, I'm like



Melissa Palmer:

this weird monitoring nerd too.



Melissa Palmer:

I had like this monitoring fetish at Veeam.



Melissa Palmer:

It was very strange.



Melissa Palmer:

Um, so like, I would like really hone in on like what to look



Melissa Palmer:

for to catch that too, right?



Melissa Palmer:

But not everybody is crazy like me.



Melissa Palmer:

Um,



Melissa Palmer:

W. Curtis Preston: I think, I think,



Melissa Palmer:

yeah, I do.



Melissa Palmer:

To answer your question, Prasanna, I do think that exfiltration as an overall



Melissa Palmer:

process is easier in that if you can get any data out that there's a, there's a



Melissa Palmer:

much higher chance that they will respond.



Melissa Palmer:

That they will pay the ransom.



Melissa Palmer:

Right?



Melissa Palmer:

Because backups aren't gonna help.



Melissa Palmer:

I'm looking at my black hat over there.



Melissa Palmer:

I'm wondering if I should like, put it on for this discussion or something.



Melissa Palmer:

Um,



Melissa Palmer:

like you would probably like see like, all right, like if I'm a bad person,



Melissa Palmer:

I'm not a bad person, I'm a good person.



Melissa Palmer:

Um, like they start small,



Melissa Palmer:

right?



Melissa Palmer:

They grab a file here and there and they see if they



Prasanna Malaiyandi:

if anyone notices.



Melissa Palmer:

this, grab that, right?



Melissa Palmer:

Like, you don't go and just be like, oh look, here's the final.



Melissa Palmer:

25 million gigabytes of MP3s.



Melissa Palmer:

I'm gonna take it all at once.



Melissa Palmer:

No, they're like picky and choosy.



Melissa Palmer:

They try to find the sensitive data.



Melissa Palmer:

They take a little bit here and there.



Melissa Palmer:

Maybe they only need to grab a couple spreadsheets.



Melissa Palmer:

Right?



Melissa Palmer:

It's not like,



Melissa Palmer:

I think there's this misnomer that like they get in there and I'm just gonna



Melissa Palmer:

start downloading massive chunks of



Melissa Palmer:

data.



Melissa Palmer:

W. Curtis Preston: well,



Melissa Palmer:

that's the whole point of



Melissa Palmer:

so you could exfiltrate a vm, just like



Melissa Palmer:

download the vmd K and be like,



Melissa Palmer:

W. Curtis Preston: yeah, exactly.



Melissa Palmer:

ad.



Melissa Palmer:

Have a



Melissa Palmer:

nice life



Melissa Palmer:

W. Curtis Preston: that's that whole phase of the, um, the initial phase of an attack



Melissa Palmer:

is trying to expand out, seeing what you can find out, seeing if you can find



Melissa Palmer:

a spreadsheet called customer database



Melissa Palmer:

You know?



Melissa Palmer:

Right.



Melissa Palmer:

W. Curtis Preston: xls , right.



Melissa Palmer:

Um,



Melissa Palmer:

or like.



Melissa Palmer:

you might not bother encrypting everything, but if you



Melissa Palmer:

can't find much, you say, all right, I'll steal some stuff and tell 'em I



Melissa Palmer:

have some files, but I won't tell them what I'll hope that'll make them pay.



Melissa Palmer:

And I'll just



Melissa Palmer:

go, you know, encrypt some stuff while.



Melissa Palmer:

Which is more illegal?



Melissa Palmer:

Is one more legal than the other?



Prasanna Malaiyandi:

I think they both are pretty bad,



Melissa Palmer:

is one more illegal than the other?



Melissa Palmer:

W. Curtis Preston: Well, they're both extortion.



Melissa Palmer:

Yeah,



Melissa Palmer:

W. Curtis Preston: the act,



Melissa Palmer:

The act



Melissa Palmer:

but if you're actually exfiltrating, you're stealing it.



Melissa Palmer:

W. Curtis Preston: yeah.



Melissa Palmer:

That's gonna depend on where this happens.



Melissa Palmer:

Uh, whether or not exfiltrating the data is a different crime.



Melissa Palmer:

And damaging the data.



Melissa Palmer:

Um, but, uh, but in the, the extortion happens on both sides, right?



Melissa Palmer:

And that's



Melissa Palmer:

definitely illegal in



Melissa Palmer:

that



Melissa Palmer:

W. Curtis Preston: pretty much



Melissa Palmer:

every jurisdiction



Melissa Palmer:

legal kids.



Prasanna Malaiyandi:

Yeah, so we talked about, so we talked



Prasanna Malaiyandi:

about incident response.



Prasanna Malaiyandi:

You've now been hit by a ransomware attack.



Prasanna Malaiyandi:

in, then let's just take VMware environments, right?



Prasanna Malaiyandi:

So what do you see people doing like, or what are things that they



Prasanna Malaiyandi:

should be doing that they're not?



Prasanna Malaiyandi:

Like, how do they even approach



Melissa Palmer:

Yeah, so he,



Prasanna Malaiyandi:

VMware environment gets encrypted Now, what



Melissa Palmer:

Um, to me it's trash.



Melissa Palmer:

I would throw it away and start over, like, I'm not even joking.



Melissa Palmer:

Throw it



Melissa Palmer:

W. Curtis Preston: No, not



Prasanna Malaiyandi:

and, and, and, and how much?



Prasanna Malaiyandi:

And and how much would you, when you say throw it away, are you talking about



Prasanna Malaiyandi:

throwing away the virtual machines, throwing away the ESXi servers, the.



Melissa Palmer:

the host, wipe the storage array, wipe it all and start over.



Melissa Palmer:

Um, and, and here's the thing, right?



Melissa Palmer:

So like, you know, I, I like it.



Melissa Palmer:

I have this weird side of me that also does like weird blogging stuff, right?



Melissa Palmer:

And like, I like SEO and stuff like that.



Melissa Palmer:

And even my career at Veeam people are like, how do I back up my VMware host?



Melissa Palmer:

you don't, they're like, what do you mean?



Melissa Palmer:

I'm like, you don't, um, you automate the build process



Melissa Palmer:

and the configuration, right?



Melissa Palmer:

You don't actually back up your host and restore it.



Melissa Palmer:

It's, you



Prasanna Malaiyandi:

You just rebuild



Melissa Palmer:

thing.



Melissa Palmer:

It's a clean install and you configure it.



Melissa Palmer:

Um, so that's what people need to be testing to is how I would



Melissa Palmer:

actually recover is almost misnomer.



Melissa Palmer:

Cuz Prasannally I would trash it.



Melissa Palmer:

Um, how do I re rapidly rebuild a VMware environment?



Melissa Palmer:

And that's something.



Melissa Palmer:

People don't do every day, right?



Melissa Palmer:

Like that stuff runs like you might have not even reinstalled.



Melissa Palmer:

You could have just been



Melissa Palmer:

upgrading for the last like 10 years and like, whatever, probably not 10, probably



Melissa Palmer:

four or five years, you'll get a new host.



Melissa Palmer:

I don't know.



Melissa Palmer:

It depends.



Melissa Palmer:

Um, so that's something that people don't practice and don't do.



Melissa Palmer:

Um, and you can actually do that all.



Melissa Palmer:

for the most part, um, in a nested virtualization environment.



Melissa Palmer:

Get all your processes down stuff.



Melissa Palmer:

So it's a pretty low co I mean, you should test on your physical hardware



Melissa Palmer:

at some point for any drivers and stuff, but it's actually a relatively low



Melissa Palmer:

cost and effort thing to figure out.



Melissa Palmer:

It's not rocket science.



Prasanna Malaiyandi:

But when you do this testing, wouldn't you also want to



Prasanna Malaiyandi:

involve, say like your networking team,



Melissa Palmer:

Yes, you would wanna, any of



Melissa Palmer:

this testing, you wanna involve anybody?



Melissa Palmer:

Everybody, right?



Melissa Palmer:

Everybody should be involved in this.



Melissa Palmer:

everybody.



Melissa Palmer:

And that's I think, one of the biggest problems we see that they're not,



Melissa Palmer:

W. Curtis Preston: So when you say,



Melissa Palmer:

They're like, I don't have time to do this.



Melissa Palmer:

W. Curtis Preston: when you say rebuild the VMware environment,



Melissa Palmer:

um, obviously you're talking about vm, you know, wiping the hosts and,



Melissa Palmer:

and the storage and all of that.



Melissa Palmer:

When we get to the phase of actually bringing back VMs,



Melissa Palmer:

Mm-hmm.



Melissa Palmer:

W. Curtis Preston: what way would you do that?



Melissa Palmer:

Um, so most backup software these days have something



Melissa Palmer:

built in where it'll actually scan for ransomware as you are restoring, right?



Melissa Palmer:

And find the ransomware if it's there.



Melissa Palmer:

Cause at that point, you know what you're infected with,



Melissa Palmer:

so you know what to look for.



Melissa Palmer:

Um, so I would be either scanning it or, you know, if you have really good.



Melissa Palmer:

and then you can decide how you're gonna fix it, or you're just gonna go



Melissa Palmer:

back to an earlier point or whatever.



Melissa Palmer:

Um, you know, some people are really good with the IR stuff and say, we know the



Melissa Palmer:

ransomware came in this date, this time we are absolutely a million percent certain



Melissa Palmer:

because we have all these logs go back to the last known good restore point, right?



Melissa Palmer:

Um, so it really depends.



Melissa Palmer:

But the backup people gonna be a big part of that, right?



Melissa Palmer:

Because it's gonna be



Melissa Palmer:

W. Curtis Preston: Y Yeah, I,



Melissa Palmer:

do they have built in?



Melissa Palmer:

W. Curtis Preston: this is something I put a lot of thought into lately



Melissa Palmer:

of if the meantime of a, of a.



Melissa Palmer:

Infection is 60 days, and some of them are twice that,



Melissa Palmer:

um, the, the idea of of saying, oh, well we got, we got infected December 1st,



Melissa Palmer:

so we're gonna restore to December 1st.



Melissa Palmer:

That's a



Melissa Palmer:

That doesn't, it doesn't always work.



Melissa Palmer:

In some cases it might, in some cases it won't.



Melissa Palmer:

And then you're going



Melissa Palmer:

back to scanning,



Melissa Palmer:

W. Curtis Preston: So you've got, you've got to, I think in most



Melissa Palmer:

cases, if many, if not most cases, you're gonna do a restoring.



Melissa Palmer:

Yeah.



Melissa Palmer:

I've seen kind of almost like two stage recoveries too.



Melissa Palmer:

Like get the bare minimum of stuff something up and run something



Melissa Palmer:

online up and running, right.



Melissa Palmer:

To restore services and then do the full recovery later.



Melissa Palmer:

So you're not, you might be like, all right, so you know what?



Melissa Palmer:

We can roll these servers back to December 29th.



Melissa Palmer:

We can use the newest copy of the database.



Melissa Palmer:

We can mash it together and make it work and serve our customers



Melissa Palmer:

while we're actually restoring everything the right way.



Prasanna Malaiyandi:

Rackspace,



Melissa Palmer:

So it did that.



Melissa Palmer:

W. Curtis Preston: Prasanna.



Melissa Palmer:

Yeah.



Melissa Palmer:

you okay?



Melissa Palmer:

You were eating another sip of tea there.



Melissa Palmer:

W. Curtis Preston: It's what I thought of when you, when you, as soon as



Melissa Palmer:

she said that, I, yeah, I know.



Melissa Palmer:

Yeah.



Melissa Palmer:

Just make sure.



Melissa Palmer:

Unlike Rackspace, just make sure that you thought of this beforehand.



Melissa Palmer:

Right.



Melissa Palmer:

The only way that this is gonna work is if you identify what are the three



Melissa Palmer:

services that need to be up right away so that we can function as a company and



Melissa Palmer:

what are the other 20, 5,000 services



Melissa Palmer:

That kind of, um, that ties almost more into like



Melissa Palmer:

the business con, you know, B C D R



Melissa Palmer:

W. Curtis Preston: Yeah.



Melissa Palmer:

Yeah,



Melissa Palmer:

continuity sort.



Melissa Palmer:

Like what are our key applications and what level of, what do we have



Melissa Palmer:

to do to get those online First comes back to our RPOs and RTOs, right?



Melissa Palmer:

W. Curtis Preston: yeah,



Melissa Palmer:

it's, it's,



Melissa Palmer:

the thing is, it's, such a



Melissa Palmer:

big discussion that unless you've had it cross-functionally with the



Melissa Palmer:

business owners and the app owners, and the infrastructure owners and the



Melissa Palmer:

security team, you're not in a good.



Melissa Palmer:

W. Curtis Preston: Yeah.



Melissa Palmer:

I, I think, I think it's, it's just, it's one thing to have a discussion,



Melissa Palmer:

again, going to Dr versus rr, um, is that it's one thing to go, well, what



Melissa Palmer:

are the servers we're gonna do first?



Melissa Palmer:

And what are, what are the servers that we're gonna do three hours later?



Melissa Palmer:

It's a whole other thing to say, what are the servers we're gonna do the



Melissa Palmer:

first couple of days, and what are the servers we're gonna do next week?



Melissa Palmer:

Right.



Melissa Palmer:

I,



Melissa Palmer:

And that, that's the problem, right?



Melissa Palmer:

You don't know until it happens.



Melissa Palmer:

Like if,



Melissa Palmer:

if you, if it's your whole environment is done right.



Melissa Palmer:

That is very different than, oh, we know, just, they just did this



Melissa Palmer:

subset of servers or whatever.



Melissa Palmer:

It's,



Melissa Palmer:

and like we were, um, The company I worked for a company



Melissa Palmer:

that I no longer worked there.



Melissa Palmer:

It was a pr uh, I was a customer and they had a, a very, they were one of the first



Melissa Palmer:

really, really big ransomware attacks in the news, and it was like a disaster.



Melissa Palmer:

I was like, wow, I'm glad I'm not on the VMware team anymore



Melissa Palmer:

there when this is going down.



Melissa Palmer:

Right.



Melissa Palmer:

Um, , but it really depends and you don't know what's gonna happen.



Melissa Palmer:

The only thing you can do is be as prepared as possible, right?



Melissa Palmer:

Test different recovery methods.



Melissa Palmer:

Um, and I love RPOs and RTOs in saying that we can meet them under a testing



Melissa Palmer:

scenario, but in the real world, we don't know that that's gonna happen.



Melissa Palmer:

W. Curtis Preston: Yeah.



Prasanna Malaiyandi:

One of the things on the podcast we talked about a couple



Prasanna Malaiyandi:

days ago was, Like Tom was mentioning, oh yeah, you just shut down your



Prasanna Malaiyandi:

network and you start figuring out, okay, what was affected but in what?



Prasanna Malaiyandi:

And you prevent everything go from going in and out.



Prasanna Malaiyandi:

And I was like, but how do you communicate?



Prasanna Malaiyandi:

Right?



Prasanna Malaiyandi:

And he's like, yeah, make sure you have ahead of time, sort of use cell phones.



Prasanna Malaiyandi:

iMessage can work.



Prasanna Malaiyandi:

You can set up a separate Slack instance completely outside of



Prasanna Malaiyandi:

the corporate environment, right?



Prasanna Malaiyandi:

Whatever it is to keep that ongoing communications.



Melissa Palmer:

like, uh, how am I supposed to use Microsoft Teams to



Melissa Palmer:

communicate with a security team?



Melissa Palmer:

Well, that might be Office 365.



Melissa Palmer:

That might be, okay, that's a bad example.



Melissa Palmer:

W. Curtis Preston: Yeah, as long as you have a, as long as you have a,



Melissa Palmer:

um, an internet connection, right?



Melissa Palmer:

Um, which is pretty easy



Melissa Palmer:

to get



Melissa Palmer:

but



Melissa Palmer:

like who has people's



Melissa Palmer:

phone numbers these days?



Melissa Palmer:

W. Curtis Preston: people with incident response plans, that's who



Melissa Palmer:

yeah, that's



Prasanna Malaiyandi:

But But aren't there issues though, where ransomware



Prasanna Malaiyandi:

actors might still have access to your Slack instance and be monitoring



Prasanna Malaiyandi:

what's going on from an incident



Melissa Palmer:

I've



Melissa Palmer:

seen that.



Melissa Palmer:

I've



Melissa Palmer:

seen that.



Melissa Palmer:

I've seen, I have seen that happen where like, they still had access.



Melissa Palmer:

It was teams.



Melissa Palmer:

I think



Melissa Palmer:

they still had access.



Melissa Palmer:

They were watching the IR



Melissa Palmer:

stuff happen as they were still in there hanging out.



Melissa Palmer:

It's like, oh yeah, Y again,



Melissa Palmer:

W. Curtis Preston: ransomware stuff is bad.



Melissa Palmer:

Melissa, I'm just gonna take that stance.



Melissa Palmer:

bad.



Melissa Palmer:

It's bad, and you don't know what's gonna happen until it happens.



Melissa Palmer:

Which is why, and it ties back to incident response, right?



Melissa Palmer:

And having an incident response firm on retainer that does this every day.



Melissa Palmer:

Right?



Melissa Palmer:

Because I, I don't care how good, even if, like, okay, let's say



Melissa Palmer:

you drop Melissa into X, Y, Z company and you put her in charge.



Melissa Palmer:

W. Curtis Preston: Do are you gonna repel down a rope from a helicopter?



Melissa Palmer:

Because that



Melissa Palmer:

Yes, I'm gonna repel down a rope from a helicopter,



Melissa Palmer:

drop me in, right, and say, Melissa, get ready for ransomware,



Melissa Palmer:

and six months later you hit me.



Melissa Palmer:

I would like to say that I'll be able to recover, but I don't know that.



Melissa Palmer:

I don't know.



Melissa Palmer:

That doesn't matter how good you are, you're not doing this every



Melissa Palmer:

day, right?



Melissa Palmer:

Like, so unless you're doing this every day, cuz every attack is different.



Melissa Palmer:

It's gonna be like, what have these people seen in the other events?



Melissa Palmer:

What, what ransomware gang have you been hit by?



Melissa Palmer:

Right?



Melissa Palmer:

So I can put everything into place that I think I will need



Melissa Palmer:

to make sure that we recover.



Melissa Palmer:

And yeah, honestly, we'd probably recover all our data.



Melissa Palmer:

I don't know if we meet our RPOs and our tails.



Melissa Palmer:

I, I, I'm pretty sure I could get all the data to the recoverable point,



Melissa Palmer:

but what was Exfiltrated, how did they get in all that kind of stuff.



Melissa Palmer:

you don't know, which is why you have to call the pros.



Melissa Palmer:

You have to call the people that do this every day.



Prasanna Malaiyandi:

Is there sort of a standard ransomware recovery test, but.



Prasanna Malaiyandi:

That kind of outlines like, Hey, here are the thing.



Prasanna Malaiyandi:

Because I can imagine, say you can't afford, the pros



Prasanna Malaiyandi:

say you can't afford the pros.



Prasanna Malaiyandi:

Right?



Prasanna Malaiyandi:

Is there sort of a, here are the testing scenarios you should be thinking



Prasanna Malaiyandi:

about, or here are the things that sort of get shot in the head when a



Prasanna Malaiyandi:

ransomware recovery or ransomware hits.



Melissa Palmer:

Um, Google tabletop exercises like ransomware



Melissa Palmer:

recovery, disaster recovery,



Melissa Palmer:

tabletop exercises.



Melissa Palmer:

Right?



Melissa Palmer:

That's a good place to start.



Melissa Palmer:

I've thought about doing like a dungeon and dragon style type,



Melissa Palmer:

like ransomware recovery thing.



Melissa Palmer:

I



Melissa Palmer:

Prasanna Malaiyandi: With the actual people.



Melissa Palmer:

Yeah, with like you get the networking security



Melissa Palmer:

think that would be



Melissa Palmer:

fun and useful.



Melissa Palmer:

And you know what?



Melissa Palmer:

When you make things fun, people actually pay a.



Prasanna Malaiyandi:

Yep.



Melissa Palmer:

right?



Melissa Palmer:

So like, if I get you all in terms and be like, today we are going to talk



Melissa Palmer:

about ransomware recovery and have a mock simulation of what would happen.



Melissa Palmer:

Be like, okay, you're a Paladin, you're a warrior, uh, you're a ma.



Melissa Palmer:

Uh, an adult black dragon just showed up and encrypted your VMs.



Melissa Palmer:

What are you doing?



Melissa Palmer:

Right?



Melissa Palmer:

Like,



Melissa Palmer:

you're gonna have so much fun,



Melissa Palmer:

you're gonna remember it, and it's gonna work out a lot better.



Prasanna Malaiyandi:

Yeah.



Prasanna Malaiyandi:

W. Curtis Preston: I like that.



Prasanna Malaiyandi:

Yeah.



Prasanna Malaiyandi:

Um, by the way, one of the things, you know, we talked a lot about prepping.



Prasanna Malaiyandi:

One of the things that I think also in terms of, we talked



Prasanna Malaiyandi:

about exfiltration monitoring.



Prasanna Malaiyandi:

I also, uh, like the idea, and we talked about it on a couple of



Prasanna Malaiyandi:

different episodes, this idea of, um, Something on your d n s side



Prasanna Malaiyandi:

that would notice when you start talking to really weird domain names.



Melissa Palmer:

Yeah, that's a



Melissa Palmer:

big one.



Melissa Palmer:

And there's all these lists.



Melissa Palmer:

Um, a lot of these researchers will just like tweet like, by the way, domains



Melissa Palmer:

looking a little hot, a little suss.



Melissa Palmer:

You might wanna block that stuff.



Melissa Palmer:

Um, so yeah,



Melissa Palmer:

there's



Melissa Palmer:

these lists of these like known bad domains and ips and stuff like that too.



Melissa Palmer:

W. Curtis Preston: Right.



Melissa Palmer:

Yeah.



Melissa Palmer:

And, and the other, uh, but I, I do think that if.



Melissa Palmer:

If you implement exfiltration monitoring, if you have a specific exfiltration



Melissa Palmer:

monitoring, I think you could stop mo or, or notice it quickly and stop it.



Melissa Palmer:

Um, but what I'm hearing from others is that not everybody



Melissa Palmer:

can afford such a thing.



Melissa Palmer:

Right.



Melissa Palmer:

Um, that, that,



Melissa Palmer:

lot of people can't afford it or they don't



Melissa Palmer:

have the skill set to build it



Melissa Palmer:

themselves, and you



Melissa Palmer:

really wanna be building and maintaining your own security systems.



Melissa Palmer:

Probably not.



Melissa Palmer:

W. Curtis Preston: No, but a lot of people do,



Melissa Palmer:

Yeah, because they have no choice.



Melissa Palmer:

It's better than nothing.



Melissa Palmer:

Like I've done



Melissa Palmer:

some weird stuff with some weird software because it was better than nothing.



Melissa Palmer:

Um, it, it, it's really a difficult point to be in.



Melissa Palmer:

And it's kind of like, you know, you all these people put out these, um, all



Melissa Palmer:

these, uh, security companies will do all this research of like, here's the



Melissa Palmer:

top ways they're getting in and blah, blah, blah, and all this kind of stuff.



Melissa Palmer:

Um, there's a lot of marketing that goes into it, but



Melissa Palmer:

there's a lot of truth, right?



Melissa Palmer:

So like, I.



Melissa Palmer:

. The big thing was the people for a long time, the people



Melissa Palmer:

let it in, you know, multi.



Melissa Palmer:

Where was it when, when this whole Cisco thing happened?



Melissa Palmer:

That was like, um, mfa, right?



Melissa Palmer:

They



Melissa Palmer:

got in through their mfa cuz they kept spamming of them.



Melissa Palmer:

Eventually they said



Melissa Palmer:

yes because like, stop calling me at 11



Melissa Palmer:

o'clock at night.



Melissa Palmer:

Um, . Now they're saying, oh, it's more vulnerabilities than people, right?



Melissa Palmer:

So honestly, I feel like the people might be easier to deal



Melissa Palmer:

with in the vulnerabilities.



Melissa Palmer:

I don't know.



Melissa Palmer:

Um, because then it's gonna be like testing the patches.



Melissa Palmer:

Can we patch everything?



Melissa Palmer:

Can we remediate everything?



Melissa Palmer:

It's, it's just like, what are the areas that you can find within your



Melissa Palmer:

own organization to be quick wins because you wanna prove that you can



Melissa Palmer:

win to your management so you get more money and can do more projects.



Melissa Palmer:

So you



Melissa Palmer:

need like a balance of quick wins to prove progress and high.



Melissa Palmer:

right?



Melissa Palmer:

What are the things that I can implement that will have the



Melissa Palmer:

most impact to reduce the risk?



Melissa Palmer:

And you're never gonna get the risk to zero.



Melissa Palmer:

I, there's um, a lot of people say that, like assume breach, right?



Melissa Palmer:

Like assume they're gonna get in so we



Melissa Palmer:

can do all this security stuff.



Melissa Palmer:

We can do all this backup.



Melissa Palmer:

And backup is basically assuming they're gonna get in, right?



Melissa Palmer:

Like, we're



Melissa Palmer:

not backing this stuff up cuz we think our security is so great.



Melissa Palmer:

Like we're assuming that it's the last line of defense, we're gonna need it.



Melissa Palmer:

Um, so a lot of it is just trying to mitigate what you.



Melissa Palmer:

in a way that makes sense for your organization, because we can't



Melissa Palmer:

have everybody working 20 hour days doing this either, or they're



Melissa Palmer:

gonna be too fried to make mistakes



Melissa Palmer:

and people are a problem.



Melissa Palmer:

Um, it, it's difficult.



Melissa Palmer:

It really is hard for any organization.



Melissa Palmer:

It's what can I do with what resources I have and cya, right?



Melissa Palmer:

If I'm, I'd probably be doing a lot of cya when, you know, they tell you



Melissa Palmer:

it's too expensive, you can't do that.



Melissa Palmer:

Well, you better have that documented.



Melissa Palmer:

So when you get ransomware, not like, Melissa, why



Melissa Palmer:

didn't you put in that security system?



Melissa Palmer:

You told me we didn't have the.



Melissa Palmer:

W. Curtis Preston: You don't know what's the current hot way that they're gonna,



Melissa Palmer:

they're, they're gonna attack you.



Melissa Palmer:

You can't stop all, uh, vulnerabilities.



Melissa Palmer:

You can't stop all stupid user things that stupid users are gonna do.



Melissa Palmer:

Um, and, um, And, and so you, I do think you, you have to assume breach, right?



Melissa Palmer:

And so you do have to do some things in your network that are going to



Melissa Palmer:

tell you when the bad guys are here.



Melissa Palmer:

Um, and that we stop it



Melissa Palmer:

as quickly as we can.



Melissa Palmer:

Can we make a movie about this?



Melissa Palmer:

Please?



Melissa Palmer:

Like that would be



Melissa Palmer:

really cool.



Melissa Palmer:

W. Curtis Preston: Nobody.



Melissa Palmer:

It'll only be



Melissa Palmer:

I'm gonna watch it



Melissa Palmer:

I'm gonna have chat, G b T, write me a movie.



Melissa Palmer:

I've had to write me ransomware, hallmark movies.



Melissa Palmer:

I kid you not, I'm just saying



Melissa Palmer:

have to entertain myself.



Melissa Palmer:

How now?



Prasanna Malaiyandi:

Wait,



Prasanna Malaiyandi:

W. Curtis Preston: my wife would



Prasanna Malaiyandi:

watch it if we make it a krama, make it a Korean drama.



Prasanna Malaiyandi:

Um,



Melissa Palmer:

be good.



Melissa Palmer:

Or like a Bollywood ransomware story.



Melissa Palmer:

W. Curtis Preston: yeah, I, there was a ransomware attack and a



Melissa Palmer:

krama that, uh, I dunno if you saw, there's one called Startup.



Melissa Palmer:

Um, and, uh, there, there's a, there's a, a really big



Melissa Palmer:

incubator in Korea in this movie.



Melissa Palmer:

Um, and this group of people, they, they do a startup there and.



Melissa Palmer:

Right at the crucial moment they get, they get a ransomware attack.



Melissa Palmer:

Um, and, and it was because some people did some dumb stuff.



Melissa Palmer:

They cut some corners, you know, and so they got



Prasanna Malaiyandi:

They got.



Prasanna Malaiyandi:

W. Curtis Preston: and the tech wasn't bad.



Prasanna Malaiyandi:

Right.



Prasanna Malaiyandi:

Um, there, I, I've actually seen a lot of, there was, uh, the good



Prasanna Malaiyandi:

doctor, that's the one with the guy that has, he's on the spectrum anyway.



Prasanna Malaiyandi:

They got, they got,



Prasanna Malaiyandi:

they got, they got a ransomware



Prasanna Malaiyandi:

attack.



Melissa Palmer:

Grey's



Melissa Palmer:

Anatomy



Melissa Palmer:

W. Curtis Preston: Uh, Grey's Anatomy did one.



Melissa Palmer:

Uh, the good doctor did one and the tech wasn't bad.



Melissa Palmer:

Right.



Melissa Palmer:

Uh, I just, I just hate it when it's like, like, when you watch, I dunno if you



Melissa Palmer:

ever watch, did you ever watch the Net?



Melissa Palmer:

Yeah.



Melissa Palmer:

Yeah.



Prasanna Malaiyandi:

Yep.



Prasanna Malaiyandi:

W. Curtis Preston: That tech



Melissa Palmer:

Look, all I know is I was, I don't know, maybe there's some



Melissa Palmer:

Hallmark movies going on in my house and it was on in the other room when I was



Melissa Palmer:

cooking dinner and my ears perked up.



Melissa Palmer:

Cause I heard something about an engineer and it was



Melissa Palmer:

the dude who was the engineer.



Melissa Palmer:

I was like, oh, I had hopes for this one.



Melissa Palmer:

So Hallmark, if you are listening to this, I would love to be your female



Melissa Palmer:

lead in a I think that would be so much.



Melissa Palmer:

Come on, come on.



Melissa Palmer:

Happy ending.



Melissa Palmer:

They, we,



Melissa Palmer:

we recover from



Melissa Palmer:

W. Curtis Preston: question is, how can you incorporate a small



Melissa Palmer:

town with a business that's, you know, on its last legs?



Melissa Palmer:

And



Melissa Palmer:

Totally.



Prasanna Malaiyandi:

That would



Prasanna Malaiyandi:

work.



Prasanna Malaiyandi:

Yeah.



Prasanna Malaiyandi:

W. Curtis Preston: instead of a ran, instead of a, uh, you know, a big



Prasanna Malaiyandi:

bookstore coming into town to shut down your little bookstore, it's



Prasanna Malaiyandi:

the ransomware attack shuts down the little, the little bookstore in



Prasanna Malaiyandi:

Or it could be at a doctor's



Prasanna Malaiyandi:

W. Curtis Preston: And,



Melissa Palmer:

Yeah.



Melissa Palmer:

Or local hospital.



Melissa Palmer:

We could



Melissa Palmer:

do local hospital.



Melissa Palmer:

That would be fine.



Melissa Palmer:

Small town hospital



Melissa Palmer:

only thing for miles.



Melissa Palmer:

W. Curtis Preston: It's, it's the big city girl that knows, um, that knows



Melissa Palmer:

about ransomware to rescue the little



Melissa Palmer:

big city girl, leaves her job at a software company, goes back



Melissa Palmer:

to her hometown to go out on her own.



Melissa Palmer:

just



Melissa Palmer:

W. Curtis Preston: Um, can you tell I've seen a Hallmark movie or show a show



Melissa Palmer:

I, it's my guilty pleasure.



Melissa Palmer:

I'm just gonna say that, uh, around Christmas there was a thing going around.



Melissa Palmer:

It was like Hallmark movie generator,



Melissa Palmer:

and I looked at it and I went, this is my life.



Melissa Palmer:

Oh my goodness.



Melissa Palmer:

I'm a Hallmark movie.



Melissa Palmer:

This is so cool.



Melissa Palmer:

W. Curtis Preston: They are kind of predictable as storylines, but, but yet



Melissa Palmer:

they've yet to have a ransomware attack.



Melissa Palmer:

Come on.



Melissa Palmer:

W. Curtis Preston: I'm behind that.



Melissa Palmer:

Yeah.



Melissa Palmer:

Well on that note, um, speaking of disappointing, um, you



Melissa Palmer:

know, if you folks like this



Melissa Palmer:

episode, I think there's



Melissa Palmer:

some,



Melissa Palmer:

I, uh, uh, I think, no, I think this was a good episode.



Melissa Palmer:

Um, and I like, I think, you know, we covered a lot.



Melissa Palmer:

We also had a little bit of fun.



Melissa Palmer:

I love that.



Melissa Palmer:

That's actually my favorite kind of episode where we, if it's just straight



Melissa Palmer:

talk the whole time, it's boring.



Melissa Palmer:

Um, and.



Melissa Palmer:

This was good.



Melissa Palmer:

Uh, good, good.



Melissa Palmer:

Smattering of both.



Melissa Palmer:

So, um, I think the one thing we're getting away from this is the best way



Melissa Palmer:

to respond to a ransomware attack is to respond to it before it happens.



Melissa Palmer:

Yes.



Melissa Palmer:

W. Curtis Preston: Right.



Melissa Palmer:

Talk to people, talk to, you know, talk to a incident response team.



Melissa Palmer:

A cyber insurance company's a good way to get one of those.



Melissa Palmer:

Um, you know, uh, do all the, the, those, the ransomware recovery scenarios, right?



Melissa Palmer:

All the different scenarios from a, the, the backup and recovery standpoint, right?



Melissa Palmer:

Um, and, um, and do some kind of monitoring, logging, logging.



Melissa Palmer:

Saving your logs, getting the logs, logging log.



Melissa Palmer:

I can't, I can't say that.



Melissa Palmer:

I can't



Melissa Palmer:

say it that



Prasanna Malaiyandi:

lugging.



Prasanna Malaiyandi:

W. Curtis Preston: Yeah, log, logging.



Prasanna Malaiyandi:

Logging, I can't, I don't know.



Prasanna Malaiyandi:

My tongue doesn't do that anyway.



Prasanna Malaiyandi:

Um, and then also some kind of monitoring for what's going on in your environment.



Prasanna Malaiyandi:

That would set off alarms when a ransomware.



Prasanna Malaiyandi:

You know, initial phase is happening.



Prasanna Malaiyandi:

Uh, cuz that's the key to start to stopping it, is to stop it.



Melissa Palmer:

Yep.



Melissa Palmer:

Get it.



Prasanna Malaiyandi:

Yeah,



Prasanna Malaiyandi:

W. Curtis Preston: absolutely.



Prasanna Malaiyandi:

Well, thanks Melissa



Melissa Palmer:

Thank you.



Melissa Palmer:

W. Curtis Preston: and uh, thanks Prasanna despite the fact that you were the



Melissa Palmer:

cause of all of our technical problems.



Prasanna Malaiyandi:

I'm sorry.



Prasanna Malaiyandi:

Hopefully not.



Melissa Palmer:

Sounds like a Hallmark



Prasanna Malaiyandi:

I



Melissa Palmer:

Sounds like a



Melissa Palmer:

Hallmark movie, just saying



Melissa Palmer:

W. Curtis Preston: We'll see this.



Prasanna Malaiyandi:

Thanks Curtis, and enjoy your vacation, Curtis, and



Prasanna Malaiyandi:

thanks Melissa for joining us again.



Melissa Palmer:

my pleasure.



Melissa Palmer:

W. Curtis Preston: We want to say thank you to our listeners as well.



Melissa Palmer:

It's been a great year, 2023.



Melissa Palmer:

So I hope you enjoyed this repeat episode.



Melissa Palmer:

That was so popular earlier in the year.



Melissa Palmer:

And again, we just want to thank you.



Melissa Palmer:

That is a wrap.