Artwork

Content provided by IVOXY Consulting. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IVOXY Consulting or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

#080 - Ransomware Preparedness with Quinton Barbe

40:54
 
Share
 

Manage episode 328234310 series 3084838
Content provided by IVOXY Consulting. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IVOXY Consulting or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Cliched though it may be, it’s true: It’s not if you’re going to experience a ransomware attack, it’s just a matter of when.

What can you do to prepare for it?

Matt “It’s 2022 but Backup is still Sexy” Yette and Matt “Trip this Wire” Cozzolino welcome back to the virtual studios for the second time in a row IVOXY’s own Mr. Quinton Barber, Security Consultant, who counts acting as an Anti-Ransomware Specialist as one of his many responsibilities. Quinton and the Matts waste no time and begin to prescribe steps you can take to harden your environment, instrument your infrastructure, and shorten the time to restore when something happens to your data.

In this episode you, our loyal and proactive but ransomware-prone listeners will get to hear about:

  • What aggregation of logs and the use of a SIEM means to your business, and how it can inform your decision makers of when to restore from (known good backup points) in a Business Continuity event.
  • How long to set your log retention for both compliance for your business and for forensics purposes for your infrastructure.
  • What the costs of business are, so to speak, when it comes to running the adjunct compute, storage, and networking you need to effectively monitor and alert on events.
  • How cutting-edge technologies like suspicious-activity snapshots from storage vendors is changing the way ransomware events are handled

If phrases like event correlation, firewalls, IDS/IPS, and MDR garner your interest, this episode’s going to be a great one for you. On the other hand, Quinton and your DCT hosts do their best to keep things very understandable and relatable if your ransomware concerns are there, but your own knowledge of all those anti-ransomware tools needs augmentation. If you’d like to attend one of IVOXY’s Security Roundtables, please reach out to your Account Manager and we’d be happy to help. If you enjoyed this episode, please be sure to like, share and subscribe wherever you found our quality podcast. Lock it down and stay tuned for another exciting episode of Data Center Therapy! Thanks for listening!

  continue reading

95 episodes

Artwork
iconShare
 
Manage episode 328234310 series 3084838
Content provided by IVOXY Consulting. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by IVOXY Consulting or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://player.fm/legal.

Cliched though it may be, it’s true: It’s not if you’re going to experience a ransomware attack, it’s just a matter of when.

What can you do to prepare for it?

Matt “It’s 2022 but Backup is still Sexy” Yette and Matt “Trip this Wire” Cozzolino welcome back to the virtual studios for the second time in a row IVOXY’s own Mr. Quinton Barber, Security Consultant, who counts acting as an Anti-Ransomware Specialist as one of his many responsibilities. Quinton and the Matts waste no time and begin to prescribe steps you can take to harden your environment, instrument your infrastructure, and shorten the time to restore when something happens to your data.

In this episode you, our loyal and proactive but ransomware-prone listeners will get to hear about:

  • What aggregation of logs and the use of a SIEM means to your business, and how it can inform your decision makers of when to restore from (known good backup points) in a Business Continuity event.
  • How long to set your log retention for both compliance for your business and for forensics purposes for your infrastructure.
  • What the costs of business are, so to speak, when it comes to running the adjunct compute, storage, and networking you need to effectively monitor and alert on events.
  • How cutting-edge technologies like suspicious-activity snapshots from storage vendors is changing the way ransomware events are handled

If phrases like event correlation, firewalls, IDS/IPS, and MDR garner your interest, this episode’s going to be a great one for you. On the other hand, Quinton and your DCT hosts do their best to keep things very understandable and relatable if your ransomware concerns are there, but your own knowledge of all those anti-ransomware tools needs augmentation. If you’d like to attend one of IVOXY’s Security Roundtables, please reach out to your Account Manager and we’d be happy to help. If you enjoyed this episode, please be sure to like, share and subscribe wherever you found our quality podcast. Lock it down and stay tuned for another exciting episode of Data Center Therapy! Thanks for listening!

  continue reading

95 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide