Artwork

Content provided by Tiffany Orth and LBMC Information Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tiffany Orth and LBMC Information Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Attacker Dwell Time

8:52
 
Share
 

Manage episode 185475582 series 1526526
Content provided by Tiffany Orth and LBMC Information Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tiffany Orth and LBMC Information Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Especially for healthcare IT systems, cyber attacks can lead to the exposure of patient data, service disruptions, time-consuming recovery processes, and high costs in the form of paying a ransom or spending money on new servers, security systems, or consultants. However, that is only when an organization is aware of the breach. Some network breaches can go on for months or even years before an organization learns about it, and these can even be organizations that take information security very seriously with compliance requirements, appropriate budgets, and talented security personnel.

The time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim “dwell time” or the “breach detection gap.” In this podcast, LBMC Information Security’s Bill Dean discusses attacker dwell time and some methods that can be implemented to address it.

Listen in, and learn about these key takeaways:

  • Advanced attacks will often circumvent traditional static protections.
  • This provides the ability for extensive “dwell time” of attackers on your network.
  • Put in place additional network controls. If malware cannot communicate out, it cannot operate.
  • “Hunt” for previously undetected malware on your systems.
  continue reading

67 episodes

Artwork

Attacker Dwell Time

Cybersecurity Sense

89 subscribers

published

iconShare
 
Manage episode 185475582 series 1526526
Content provided by Tiffany Orth and LBMC Information Security. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Tiffany Orth and LBMC Information Security or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Especially for healthcare IT systems, cyber attacks can lead to the exposure of patient data, service disruptions, time-consuming recovery processes, and high costs in the form of paying a ransom or spending money on new servers, security systems, or consultants. However, that is only when an organization is aware of the breach. Some network breaches can go on for months or even years before an organization learns about it, and these can even be organizations that take information security very seriously with compliance requirements, appropriate budgets, and talented security personnel.

The time elapsed between the initial breach of a network by an attacker and the discovery of that breach by the victim “dwell time” or the “breach detection gap.” In this podcast, LBMC Information Security’s Bill Dean discusses attacker dwell time and some methods that can be implemented to address it.

Listen in, and learn about these key takeaways:

  • Advanced attacks will often circumvent traditional static protections.
  • This provides the ability for extensive “dwell time” of attackers on your network.
  • Put in place additional network controls. If malware cannot communicate out, it cannot operate.
  • “Hunt” for previously undetected malware on your systems.
  continue reading

67 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide