“Best Practices” in Responding To Cyber Incidents to Mitigate Business Impact

Sinu Peter, Cyber Security Director, CyberProof
Jaimon Thomas, VP Customer Engineering, CyberProof

For enterprises that have migrated to the cloud, the ability to detect & respond quickly is essential to mitigate the potential business impact of an attack. Known for its unconventional methods and use of advanced extortion techniques, BlackCat has quickly risen to prominence in the cybercrime community. As this ransomware group forges its way to gain more clout, we examine its operations and discuss how organizations can shore up their defenses against it. We will share experiences of how we handled a BlackCat ransomware attack and worked effectively with our client, in real time, to eliminate the threat. The incident response is described from the perspective of the Digital Forensics & Incident Response team, and it focuses on demonstrating “Best Practices” regarding incident management. As the threats we face continue to evolve, the streams of data being collected and processed is key to understanding threat coverage within an organisation. We will also discuss how to prioritise event sources and build a cloud-native, cost-optimised data lake to enable continuous threat hunting and detect advanced threats.

Follow us on social

Keep up to date with what's going on by following us on social media.

Featured blogs

Read the latest news and views from key industry figures and thought leaders.

Questions Around Enterprise Generative AI You Should Be Asking
There has been a lot of talk about enterprise generative AI over the last few months as its use has become more implemented. However, the real questions should be asked by security teams about their providers’ approach to data privacy, transparency, user guidance, and secure design and development. There is no doubt that GenAI is...
Enterprise Security Practices You Can Perform at Home
Security is equally important in the home as it is in the workplace. Enterprise security involves areas of identity management access control, application auditing, and protection of data and information. It is strictly abided to preserve and protect the business from outside hackers and threat actors. However, a similar level of personal security does not...
risk management conference london
Online Safety Protection Guide for Enterprise Employees
Cybersecurity may be the biggest issue in the online world, with ever-evolving apps and programs designed to keep you safe from online threats, but the real world poses genuine threats that your devices can help to protect you from. The question for enterprise employees is – are you utilising the safety features that devices like...