Digital forensics discussion for computer forensics, DFIR and eDiscovery professionals. Visit Forensic Focus at forensicfocus.com for more.
…
continue reading
A new independent Podcast focusing on all things IT Security, although with a SOC focus. From Incident Response, Pen Testing, Ransomware and Digital Forensics, through to hiring, certification and recruitment. Enjoy a mix of up-to-date commentary and guest interviews with a few laughs and stories along the way.
…
continue reading
Cyber Defense Community Indonesia (CDEF) is a community that focus in incident, detection & response, threat hunting, security hardening, security monitoring, digital forensic, security awareness, security policy, etc For more information, click here https://linktr.ee/cdef.id
…
continue reading
Formerly known as "Restore it All," The Backup Wrap-up podcast turns unappreciated backup admins into cyber recovery heroes. After a brief analysis of backup-related news, each episode dives deep into one topic that you can use to better protect your organization from data loss, be it from accidents, disasters, or ransomware. The Backup Wrap-up is hosted by W. Curtis Preston (Mr. Backup) and his co-host Prasanna Malaiyandi. Curtis' passion for backups began over 30 years ago when his employe ...
…
continue reading
CyberSecurity Sense is LBMC Information Security's podcast that provides insight and updates on such information security topics as: IPS Monitoring and Managed IDS Services, Security Information Event Management, Digital Forensic Analysis, Electronic Discovery and Litigation Support, Computer Security Incident Response, Penetration Testing, Risk Assessments, Security Program Planning, Web Application Security Assessments, ACAB LADMF Certification Assessments, CMS Information Security, FedRAM ...
…
continue reading
1
Rogue Administrator Nightmare: Lessons from a Real-Life Attack
38:05
38:05
Play later
Play later
Lists
Like
Liked
38:05
In this episode of The Backup Wrap-up that proves Curtis right :) we look into the shocking case of a rogue administrator who held an entire company's IT infrastructure hostage. We explore how Daniel Rhyne, a core infrastructure engineer, managed to lock out his colleagues and demand a $750,000 ransom. This real-world example highlights the critica…
…
continue reading
1
Business Impact Analysis: Your Key to Resilient Operations
46:22
46:22
Play later
Play later
Lists
Like
Liked
46:22
In this episode of The Backup Wrap-up, we explore the critical process of a business impact analysis (BIA) and its importance for organizations of all sizes. Our expert guest, Dr. Mike Saylor, shares valuable insights on conducting effective BIAs, including why it's best to have a third party perform them. We discuss how business impact analysis in…
…
continue reading
1
The Impact Of AI On Video Forensics: Insights From Amped Software
49:43
49:43
Play later
Play later
Lists
Like
Liked
49:43
Martino Jerian, CEO of Amped Software, joins the Forensic Focus Podcast to discuss AI’s impacts on video forensics. In this episode, Martino delves into the growing role of artificial intelligence in automating forensic processes, as well as the benefits and challenges it brings to the field. He shares insights on how AI is reshaping image and vide…
…
continue reading
1
Building a Resilient Ransomware Backup Strategy
50:40
50:40
Play later
Play later
Lists
Like
Liked
50:40
In this essential episode of The Backup Wrap-up, we delve into the critical components of a robust ransomware backup strategy. We explore the concept of dwell time and its implications on backup retention periods, emphasizing the need for longer-term storage solutions. Our discussion covers the importance of frequent backups and designing systems w…
…
continue reading
1
The Impact Of Traumatic Material On Well-Being in DFIR
56:46
56:46
Play later
Play later
Lists
Like
Liked
56:46
Paul Gullon-Scott BSc MA MSc MSc FMBPSS joins the Forensic Focus Podcast to discuss the mental health challenges faced by digital forensic investigators (DFIs), particularly in relation to secondary traumatic stress (STS). He explains how exposure to distressing content, such as child sexual abuse material (CSAM), can lead to burnout, anxiety, and …
…
continue reading
1
Detecting Ransomware Before It's Too Late
45:25
45:25
Play later
Play later
Lists
Like
Liked
45:25
In this eye-opening episode of The Backup Wrap-up, we delve into the critical topic of detecting ransomware. Joined by cybersecurity expert Dr. Mike Sailor, we explore the subtle signs that could indicate a ransomware attack in progress. From slight performance degradation to unusual network behavior, we cover the early warning signs that every IT …
…
continue reading
1
Tabletop Exercises: Your Secret Weapon Against Cyberattacks
47:32
47:32
Play later
Play later
Lists
Like
Liked
47:32
In this eye-opening episode of The Backup Wrap-up, we delve into the world of tabletop exercises and their crucial role in cybersecurity preparedness. Our guest expert, Mike Saylor from Black Swan Security, guides us through the ins and outs of planning and executing effective tabletop exercises. We explore why these simulations are essential for o…
…
continue reading
1
Fostering a Culture of Cybersecurity with Training
45:01
45:01
Play later
Play later
Lists
Like
Liked
45:01
In this important episode of The Backup Wrap-Up, we delve into the world of cybersecurity training. We explore why effective training is crucial in today's digital landscape and how to implement a comprehensive program that goes beyond just ticking boxes. From creating robust cybersecurity policies to conducting engaging, frequent training sessions…
…
continue reading
1
Incident Response Plan 101: From BIA to Execution
37:00
37:00
Play later
Play later
Lists
Like
Liked
37:00
In this very dense episode of The Backup Wrap-up, we delve into the critical world of incident response plans, from the business impact analysis (BIA) to finalizing its creation. Our expert guest, Dr. Mike Saylor, CEO of Blackswan Security, shares invaluable insights on crafting and implementing effective incident response strategies. We explore th…
…
continue reading
1
Reducing Your Cyberattack Blast Radius: Expert Tips
37:51
37:51
Play later
Play later
Lists
Like
Liked
37:51
In this eye-opening episode of The Backup Wrap-up, we delve into the critical concept of minimizing the cyberattack blast radius. Joined by cybersecurity expert Dr. Mike Saylor, we explore practical strategies to significantly reduce the impact of a breach on your organization. We start by discussing the principle of least privilege access and its …
…
continue reading
1
Is There A Mental Health Crisis In Digital Forensics?
1:03:08
1:03:08
Play later
Play later
Lists
Like
Liked
1:03:08
Content warning - this episode discusses suicidal feelings. Prof. Sarah Morris joins the Forensic Focus Podcast to discuss the critical topic of mental health within the digital forensics field. The conversation covers the impact of traumatic content on analysts, the gaps in mental health support services, and the challenges faced by the industry d…
…
continue reading
1
Ransomware Forensics: Preserving Digital Evidence
45:10
45:10
Play later
Play later
Lists
Like
Liked
45:10
In this episode of The Backup Wrap-Up, we delve into the crucial world of ransomware forensics with cybersecurity expert Mike Saylor. We explore the essential steps and tools used in forensic analysis during a cyber attack, highlighting the importance of preserving evidence and navigating the complexities of both traditional and mobile device foren…
…
continue reading
1
The Cyber Insurance Playbook: What You Need to Know
50:02
50:02
Play later
Play later
Lists
Like
Liked
50:02
Dive into the world of cyber insurance with our latest episode featuring expert Mike Saylor. We explore the evolving landscape of cyber insurance policies and their crucial role in today's digital security strategies. Learn why cyber insurance is more than just a financial safeguard and how it can be a proactive tool in your cybersecurity arsenal. …
…
continue reading
In this important episode of "The Backup Wrap-Up," we continue our discussion on ransomware, and dive deeper into the world of ransomware prevention. We assume you've done the basics (password & patch management, and MFA), and want to do more. As cyber threats continue to evolve, it's more important than ever to stay ahead of potential attacks. We …
…
continue reading
1
Combating The Rise Of AI-Generated Child Exploitation Material With Heather Barnhart
51:41
51:41
Play later
Play later
Lists
Like
Liked
51:41
Heather Barnhart from Cellebrite joins the Forensic Focus Podcast to discuss combating the rise of AI-generated child exploitation material. Heather shares her extensive experience and insights on the impact of AI and deepfakes on investigations, the challenges faced by law enforcement worldwide, and the importance of education in combating digital…
…
continue reading
1
Unlocking The Power Of Digital Forensics Training And Certification With Magnet Forensics
1:02:56
1:02:56
Play later
Play later
Lists
Like
Liked
1:02:56
Chuck Cobb from Magnet Forensics joins the Forensic Focus Podcast to discuss training and certification. Chuck delves into his extensive background, including his tenure in law enforcement and over a decade of experience in forensic training at both Guidance Software and Magnet. He emphasizes the evolution of forensic training, particularly highlig…
…
continue reading
1
IT Security Audit Essentials: Protect Your Network
38:19
38:19
Play later
Play later
Lists
Like
Liked
38:19
In this episode of The Backup Wrap-Up, we delve into the critical world of IT security audits. We explore why these audits are essential for maintaining a robust cybersecurity posture and how they can help organizations identify and address potential vulnerabilities. Our discussion covers key elements of surviving an IT security audit, including us…
…
continue reading
1
How to Stop Ransomware: 3 Essential Strategies
48:27
48:27
Play later
Play later
Lists
Like
Liked
48:27
Discover how to stop ransomware in its tracks with this informative episode of The Backup Wrap-up. Hosts W. Curtis Preston and Prasanna Malaiyandi look into three crucial strategies that can prevent 90% or more of ransomware attacks. Learn why patch management is your first line of defense and how to implement it effectively. Explore the world of p…
…
continue reading
1
Setting The Standard For Image And Video Forensics In The US With Amped Software
44:10
44:10
Play later
Play later
Lists
Like
Liked
44:10
Blake Sawyer from Amped Software joins the Forensic Focus Podcast to discuss video and image forensics in the US. He shares insights on the challenges of working with low-quality CCTV footage and how Amped Software has grown and been adopted in the US market. The conversation delves into the role of the Scientific Working Group on Digital Evidence …
…
continue reading
1
Immutable Backups: Your Ultimate Defense Against Ransomware
44:31
44:31
Play later
Play later
Lists
Like
Liked
44:31
In this episode, we delve into the world of immutable backups, a crucial component of modern data protection strategies. We explore why immutable backups have become increasingly important in the face of sophisticated cyber threats, especially ransomware attacks that target backup systems. The episode covers the evolution from tape backups to disk-…
…
continue reading
1
Protect Backups from Ransomware: Expert Strategies
34:50
34:50
Play later
Play later
Lists
Like
Liked
34:50
In this crucial episode, we delve into how to protect backups from ransomware, a critical concern for IT professionals and business owners alike. We explore why backup systems are prime targets for cybercriminals and the devastating consequences of a successful attack. Our discussion covers essential strategies to fortify your backups, including im…
…
continue reading
This episode about what is ransomware is the first in a new series on the topic. The episode explores what it is, how it works, and why it has become such a significant threat to businesses and individuals alike. We discuss the evolution of ransomware attacks, from simple data encryption to sophisticated extortion schemes involving data exfiltratio…
…
continue reading
In this episode, we explore the differences between XDR and SIEM, two crucial tools in the world of security monitoring. Our guest, Dez Rock, CEO of SIEMonster, shares her fascinating journey from professional hacker to building an affordable, scalable SIEM solution that encompasses SOAR and XDR capabilities. We discuss the importance of evaluating…
…
continue reading
1
Strengthening Your Cybersecurity Blue Team: Pro Tips
51:30
51:30
Play later
Play later
Lists
Like
Liked
51:30
In this episode, we explore the essential strategies and best practices for building and optimizing a blue team cybersecurity approach. Our guest, Mike Saylor, shares his expertise on how organizations can effectively prepare for and respond to cyber incidents. From establishing relationships with law enforcement to conducting tabletop exercises an…
…
continue reading
1
Thinking Like a Hacker: Red Team Cyber Security Strategies
56:24
56:24
Play later
Play later
Lists
Like
Liked
56:24
In this popular episode from last year, we explore the fascinating world of red team cyber security with Dwayne Laflotte, a seasoned expert in offensive cybersecurity. Dwayne shares his wealth of knowledge and experience, diving into the tactics and strategies employed by red teams to identify vulnerabilities and strengthen an organization's defens…
…
continue reading
1
PCI Monthly Update: Latest News and Updates to Requirement 12
39:37
39:37
Play later
Play later
Lists
Like
Liked
39:37
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the impact of PCI v4.0 and how organizations are adjusting. In case you missed it - Andy Kerr joined PCI Practice Partner Stewart Fey for an interactive Q&A …
…
continue reading
1
Google Cloud Disaster Recovery: Lessons from UniSuper's Close Call
31:26
31:26
Play later
Play later
Lists
Like
Liked
31:26
In this episode, we delve into the critical importance of Google Cloud disaster recovery planning through the lens of UniSuper's recent brush with catastrophe. When Google accidentally deleted UniSuper's entire VMware environment, the Australian pension provider faced the terrifying prospect of losing access to $125 billion in assets and the data o…
…
continue reading
1
Electronic Discovery tools that extract from backups
52:06
52:06
Play later
Play later
Lists
Like
Liked
52:06
In this episode, we explore the world of electronic discovery tools and how they're transforming the legal landscape. Our guest, Brendan Sullivan, shares his expertise on the challenges companies face when dealing with legacy data and the importance of using the right tools for eDiscovery. Learn how purpose-built software can greatly enhance effici…
…
continue reading
1
Cloud Disaster Recovery: Lessons from Failures
42:00
42:00
Play later
Play later
Lists
Like
Liked
42:00
Capping our series on cloud disasters is this one on cloud disaster recovery. In this episode, we review the lessons we learned from discussing 10 cloud disasters. We talk about the critical strategies and techniques to ensure your data is protected and recoverable in the event of a disaster in the cloud. From the basic 3-2-1 rule to the pitfalls o…
…
continue reading
1
PCI Monthly Update: Latest PCI News, Requirement 11 Overview, and QSA Insights
33:43
33:43
Play later
Play later
Lists
Like
Liked
33:43
Join us for the latest episode of our PCI Monthly Update podcast, where we explore the latest developments in the world of payment card industry security. We begin with a news segment covering the launch of PCI v4.0 and the ins and outs of the new INFI (Items Noted For Improvement) Worksheet. Next up, we'll cover Requirement 11 - Test security of s…
…
continue reading
1
AI-Powered License Plate Reading With Amped DeepPlate
38:17
38:17
Play later
Play later
Lists
Like
Liked
38:17
Marco Fontani joins the Forensic Focus podcast to discuss Amped Software’s latest AI-powered tool, DeepPlate. DeepPlate is a deep learning system designed to read license plates affected by common issues introduced by surveillance systems, making it a valuable asset for forensic video analysts. Marco provides an in-depth overview of DeepPlate, expl…
…
continue reading
1
Life Uncontained YouTube Channel Loses Month of Footage in Crash
41:41
41:41
Play later
Play later
Lists
Like
Liked
41:41
In this episode, we discuss the devastating crash experienced by the popular YouTube channel "Life Uncontained," which resulted in the loss of a month's worth of irreplaceable video footage. The Life Uncontained crash serves as a stark reminder of the importance of proper backup strategies for protecting valuable digital assets. We delve into the l…
…
continue reading
1
The Disastrous Dedoose Crash: Lessons Learned
39:57
39:57
Play later
Play later
Lists
Like
Liked
39:57
In 2014, the cloud-based research platform Dedoose suffered a catastrophic crash, losing customer data and backups simultaneously. We examine the causes of the Dedoose crash, its impact on users, and crucial lessons for anyone relying on SaaS. Learn how subpar backup practices, like monthly-only backups and overwriting previous versions, can lead t…
…
continue reading
1
StorageCraft Outage: Lessons from a Cloud Backup Disaster
34:35
34:35
Play later
Play later
Lists
Like
Liked
34:35
In this episode, we examine the StorageCraft outage that erased customer backup data during a botched cloud migration. We compare StorageCraft's response to Carbonite's in a similar incident and discuss the critical lessons for backup vendors and customers. Learn the importance of meticulous migration processes, potential backup resiliency strategi…
…
continue reading
1
Cyber Scandals And When (Not) To Trust Computers
1:00:18
1:00:18
Play later
Play later
Lists
Like
Liked
1:00:18
Join Si and Desi for another episode of the Forensic Focus Podcast. This week, they discuss the lack of transparency and potential misrepresentation in the cybersecurity industry, particularly regarding the use of open-source tools by companies and the questionable interpretation of data and statistics in marketing and advertising. The conversation…
…
continue reading
1
Rackspace Ransomware Attack: Lessons Learned
42:06
42:06
Play later
Play later
Lists
Like
Liked
42:06
In this episode, we examine the Rackspace ransomware attack that crippled the company's hosted exchange environment, affecting thousands of customers. We discuss the timeline of events, the importance of timely patching, and the challenges Rackspace faced in restoring customer data. Learn about the value of comprehensive disaster recovery plans and…
…
continue reading
1
The Carbonite Lawsuit: A Cloud Backup Cautionary Tale
46:13
46:13
Play later
Play later
Lists
Like
Liked
46:13
In this episode, we uncover the troubled history of Carbonite, a once prominent cloud backup provider plagued by lawsuits. In one Carbonite lawsuit they were the plaintiff, in another they were the defendant. From using inadequate storage arrays to failing to protect customer data, Carbonite's story serves as a warning for backup customers. Learn t…
…
continue reading
1
Kickstarting Your Digital Forensics Cybersecurity Career
58:04
58:04
Play later
Play later
Lists
Like
Liked
58:04
Sophie Powell joins Si and Desi on the Forensic Focus Podcast to discuss various topics including her recent participation in a TryHackMe webinar, the challenges of applying for graduate schemes, and the relevance of the Cyber 9/12 competition to her career in cybersecurity. They also touch on the psychology of conspiracy theories and the implicati…
…
continue reading
1
Salesforce.com's Permission Slip-Up (Another Cloud Disaster)
33:54
33:54
Play later
Play later
Lists
Like
Liked
33:54
In this episode of The Backup Wrap-Up, Curtis and his co-host dive into the chaos caused by Salesforce's accidental "modify all" permission change in 2019. They explore the fallout from this real-world SaaS disaster, including how Salesforce scrambled to restore proper permissions and the frustration felt by impacted customers. Curtis and his co-ho…
…
continue reading
1
PCI Monthly Update: Version 4.0 Countdown, Requirement 10, and QSA Insights
27:45
27:45
Play later
Play later
Lists
Like
Liked
27:45
In this edition of the PCI Monthly Update, we’re counting down to the launch of PCI 4.0! We start this month's podcast with a reminder that v4.0 goes into full effect on March 31. Our focus then shifts to Requirement 10 covering logging and monitoring all access to system components and card holder data and what is changing with v4.0. This podcast …
…
continue reading
1
KPMG Blunder Proves Microsoft 365 Needs Backup (Cloud Disasters)
40:56
40:56
Play later
Play later
Lists
Like
Liked
40:56
In this shocking episode of The Backup Wrap-up, we delve into the jaw-dropping data loss disaster that struck global consulting giant KPMG at the height of the 2020 pandemic. With one errant click, a Microsoft 365 admin accidentally wiped out months of critical Teams chat data for a staggering 145,000 employees. Join host W. Curtis Preston as he un…
…
continue reading
1
How Cado Security Is Revolutionizing Forensics And Incident Response For The Cloud
45:49
45:49
Play later
Play later
Lists
Like
Liked
45:49
Chris Doman, Co-Founder of Cado Security, joins the Forensic Focus podcast to discuss cloud forensics and incident response. Cado Security provides cloud-based software for collecting and analyzing forensic evidence in cloud environments. Chris discusses the challenges of cloud forensics, such as the constantly changing nature of cloud environments…
…
continue reading
In this important episode of the Backup Wrap-up, W. Curtis Preston, AKA Mr. Backup, takes you on a deep dive into the shocking story of the OVHCloud data center fire of 2021. This catastrophic event left hundreds of customers scrambling to recover their precious data (often without backups), exposing the startling truth about OVHCloud's data center…
…
continue reading
1
Cloud disasters: Musey deletes their own company!
26:13
26:13
Play later
Play later
Lists
Like
Liked
26:13
In this episode, we uncover the little-known but cautionary tale of Musey, a startup building an interior design app that catastrophically lost everything when an admin accidentally deleted their entire Google Workspace account. We dive deep into: How a single slip-up by an admin led to over $1.5 million of intellectual property stored in Google Dr…
…
continue reading
1
Cloud catastrophes: Codespaces.com deleted out of existence
35:57
35:57
Play later
Play later
Lists
Like
Liked
35:57
In 2014, software-as-a-service company Code Spaces disappeared overnight after a devastating cyber attack. Thousands of coders lost access to their work when insufficient cloud backups failed under pressure. The company was forced to go out of business. Learn the tragic tale of how Code Spaces ignored standard data protection rules, putting their b…
…
continue reading
1
How MSAB Is Managing The Digital Forensics Challenges Of Frontline Policing
48:37
48:37
Play later
Play later
Lists
Like
Liked
48:37
Alan Platt, Professional Services Consultant at MSAB, discusses his experience as a former UK police officer working in digital forensics. He talks about the different levels of digital forensics capabilities within police forces and how MSAB products like XAMN and XEC Director are used by frontline officers versus lab analysts. The discussion cove…
…
continue reading
1
Crafting the Perfect Disaster Recovery Runbook
39:56
39:56
Play later
Play later
Lists
Like
Liked
39:56
In this information-packed episode, backup guru W. Curtis Preston and expert guest Prasanna Malaiyandi explore the elements of crafting an effective disaster recovery (DR) runbook. They discuss how a properly structured runbook eliminates confusion during crises by clearly outlining responsibilities and contacts. From making runbooks accessible and…
…
continue reading
1
To DRaaS or Not to DRaaS? Comparing Disaster Recovery Approaches
39:01
39:01
Play later
Play later
Lists
Like
Liked
39:01
Disaster lurks around every corner - ransomware, natural disasters, human errors. Are you thinking about all the data and systems at risk. Is your organization prepared? In this episode, Curtis and Prasanna pull back the curtain on the disaster recovery decision - to build or to buy? They unpack the tradeoffs around cost, complexity, control, and e…
…
continue reading
Creating an effective DR strategy means understanding the critical differences between hot, warm, and cold recovery sites. Join backup guru W. Curtis Preston and his cohost Prasanna Malaiyandi for the latest Backup Wrap-Up as they outline real-world strategies to match your RTO, RPO, and budget. You’ll learn the unique benefits and challenges of us…
…
continue reading
1
PCI Monthly Update: Gearing Up for Version 4.0, Mastering Requirement 9, and QSA Insights
29:44
29:44
Play later
Play later
Lists
Like
Liked
29:44
In this January edition of the PCI Monthly Update, we’re on the brink of exciting changes with version 4.0 just around the corner! We start with a spotlight on the ongoing Request for Comments (RFC) period for PCI DSS v4.0, inviting insights from industry experts. Plus, we discuss the Global Content Library, showcasing insights from the 2023 Commun…
…
continue reading