Learning Library

← Back to Library

Ransomware Response: Training & Preparation

Key Points

  • Meg West explains that incident response consultants spend most of their time proactively preparing clients—not just reacting to attacks—through training and “Security Incident Response First Responder” (SIRFR) classes that teach technical response skills and log analysis.
  • A key part of preparation is educating non‑technical employees, who are the weakest link, about common attack vectors such as phishing and the social‑engineering tactics (urgency, fear) attackers use to trick them.
  • By training both cyber‑security staff and everyday workers to recognize and properly handle suspicious communications, organizations can avoid panic and reduce the likelihood of successful ransomware or breach incidents.
  • The consultant emphasizes that effective incident response also relies on having appropriate security tools in place to detect and block attacks before they reach vulnerable users.
  • Overall, a blend of hands‑on technical training, employee awareness programs, and preventive technology is presented as the best strategy to mitigate ransomware nightmares.

Full Transcript

# Ransomware Response: Training & Preparation **Source:** [https://www.youtube.com/watch?v=XyOvdhjrEX4](https://www.youtube.com/watch?v=XyOvdhjrEX4) **Duration:** 00:08:21 ## Summary - Meg West explains that incident response consultants spend most of their time proactively preparing clients—not just reacting to attacks—through training and “Security Incident Response First Responder” (SIRFR) classes that teach technical response skills and log analysis. - A key part of preparation is educating non‑technical employees, who are the weakest link, about common attack vectors such as phishing and the social‑engineering tactics (urgency, fear) attackers use to trick them. - By training both cyber‑security staff and everyday workers to recognize and properly handle suspicious communications, organizations can avoid panic and reduce the likelihood of successful ransomware or breach incidents. - The consultant emphasizes that effective incident response also relies on having appropriate security tools in place to detect and block attacks before they reach vulnerable users. - Overall, a blend of hands‑on technical training, employee awareness programs, and preventive technology is presented as the best strategy to mitigate ransomware nightmares. ## Sections - [00:00:00](https://www.youtube.com/watch?v=XyOvdhjrEX4&t=0s) **Preparing for Ransomware with First‑Responder Training** - Incident response consultant Meg West explains how her firm educates clients—through Security Incident Response First Responder (SIRFR) classes on log analysis, digital forensics, and response protocols—to proactively handle ransomware attacks before they occur. - [00:03:08](https://www.youtube.com/watch?v=XyOvdhjrEX4&t=188s) **Industry‑Specific Incident Response Planning** - The speaker explains how organizations tailor threat expectations by industry, develop a pre‑defined cybersecurity incident response plan, and validate it through simulations and ransomware readiness assessments. - [00:06:20](https://www.youtube.com/watch?v=XyOvdhjrEX4&t=380s) **Proactive Incident Response Planning** - The speaker urges organizations to analyze incidents for root causes and to secure an incident‑response retainer beforehand, emphasizing that preventive preparation is far cheaper than reacting after a breach. ## Full Transcript
0:00It's every business's worst nightmare. 0:02They've been hacked 0:03and ransomware is being demanded, and they don't really know what to do. 0:07Today we have with us Meg West. 0:09She is an incident response consultant and she's going to show us what she does 0:13as part of her role on X-Forceto be able to deal with this very problem. 0:17Can you help me out? What would I have done? 0:19Yeah, absolutely. 0:20I can definitely help you out. 0:21Thankfully, that's what I do every day. 0:23A large misconception about incident response consultants 0:26is that we literally only respondto incidents doing the technical things. 0:30But the reality is a large portionof incident response, and what I do 0:33for my daily job, is helping my clients prepare for the incident. 0:37And as we've noted down, one of the first things that we do 0:39as an incident response consulting agency is education for our clients. 0:43We go to them and we help them discern if an incident happens, 0:46how should they be reacting to it? 0:48We offer things that are called SIRFR classes 0:50or that stands for security incident response, first responder classes. 0:54And we literally teach these cybersecurity people from different organizations 0:58how to respond to an incident if it happens. 1:00Digital forensics, how to query logs, anything that could be relevant 1:04to responding to an incident. 1:06So helping these people prepare for the incident 1:08and learn how to do these technical things before it actually happens 1:12saves them from being in a scramble when the incident does occur. 1:15Well, that makes a lot of sense. 1:16But there's also education for the people 1:19who are ultimately responsible for some of these break ins, employees. 1:23What do they do on their education side? 1:25Yeah, absolutely. 1:25So employee education for people who don't work in I.T. 1:28is just as important as educating your incident response and cybersecurity folks. 1:33And the reason for that being is that humans employees 1:36are some of the weakest links in an organization, 1:38and they're some of the biggest and most widely targeted 1:40people in an organization because they're not generally 1:42formally trained on how to detect a cybersecurity incident. 1:46Today, it stands that phishing through email 1:49is one of the largest attack vectors. 1:51That's how most of the attacks are still happening. 1:53People still fall for that. 1:54Absolutely. Literally every single day. 1:56So what we can do is educate our employees on how to look 2:00for a cybersecurity attack. 2:02For instance, if an employee receives an email 2:04that's urging them to do something extremely quickly, it says, Hey, Dan, 2:08you need to click on this link and update your password 2:10in the next 2 hours or else you're getting fired. 2:12The attackers are trying to play on your sense of urgency. 2:15They're creating fear. 2:16They want you to think irrationally 2:17and illogically to get you to do something quickly. 2:19So when we take the time to educate our employees 2:22and let them know, hey, you should be expecting to receive this kind of emails, 2:26they're better prepared for it. 2:27Should we have in place the security tools to help prevent this? 2:30Yes, of course. Email filters and firewalls are going to help, 2:33but they're still going to be at 1% or less that make it through unfortunately. 2:37And that's why we need to train our secondary defenses,which are the people, and educate them. 2:41It makes a lot of sense, and I suppose this is part of a larger strategy. 2:44Education is just the first fork of that. What is the rest of that strategy look like? 2:49A large part of working in incident response consulting, 2:52especially from the proactive side, we say proactive because it becomes more 2:55the incident is trying to strategize 2:57what are we going to do when the incident happens. 2:59We're trying to predict 3:00based upon our industry, where our industries, 3:03where our organization is located, how many employees we have, 3:06what kind of data types we're dealing with. 3:08We want to strategize what kind of incidents and attacks 3:10can we expect to happen just because we're a financial industry, 3:14because we're a health care industry, we can generally tell based upon the type 3:18of industry and several other factors what kind of attacks to expect. 3:21So for us, we're trying to discern that. 3:23Second, we're trying to put in placea plan. 3:26We have what's called a cybersecurityincident response plan. 3:29That's something that every organizationshould have. 3:31It's a plan that literally dictates 3:32what you should be doing when an incident happened 3:34so that you're prepared and you have a checklist 3:36of what to run through when it happens. 3:38And that strategization is going to take away a lot of the questioning, 3:41a lot of the gray area of when an incident happens 3:44instead of trying to discern who do I need to escalate this incident to? 3:47Who do I need to call at 2 a.m. in the morning when I need a firewall change? 3:51It's already all strategized out. 3:52It's pre-planned so that it takes a lot of the guesswork away. 3:55One thing, though, a part of a strategy to really make sure it works, 3:58I suppose, is to simulate. And how does that play out? 4:01Yeah, absolutely. 4:02So how we can try the strategy into the simulation and going back to the strategy part a little bit, 4:07one thing that's really important for a lot of organizations are to do assessments, right? 4:11Specifically, we do a lot of ransomware readiness assessments. 4:14And what that means is we'll go into an organization, 4:17we'll ask them all their technical, they're executive experts, 4:20a lot of really in-depth detail questions and take a look at their environment 4:23and kind of do a gap analysis that says if you were to get hit by ransomware, 4:27how devastating, how large of an impact would it be for your organization? 4:31And based on the results of that, then we're going to carry into the simulation aspect of it. 4:35Once we know your weaknesses, where your organization needs to better bolster their cybersecurity, 4:41we're going to go ahead and we're goingto test this in a simulation. 4:44So specific we offer a cyber range exercise, think cyber warfare, kind of purpleteaming going on, 4:50where we're going to go ahead and virtualizea client's environment and replicate it. 4:54And then we're going to craft a very specific scenario to that client, to their industry, 4:59and we're going to put it into play in the actual virtualized environment and have them go and respond to the incident. 5:05Meanwhile, personnel like myself and my colleagues who have years 5:08of training, working in incident response, we're taking very cautious notes. 5:12We're trying to discern, you know, how can we help this organization 5:15do better by watching them carry out the simulation. 5:19And then we write them a report, a very detailed report 5:21that says you should do this better so that you can respond better to an incident. 5:25And that really points out the flaws potentially in that strategy that you've done in a prior step. 5:29Yeah, absolutely. So it all ties in together very well. 5:32And that, of course, brings us to the last point 5:34is, is that once you've gone through all this, I'm sure there are some lessons to be learned. 5:38That's something you talk about before as a formal practice. 5:41Yeah, of course. It's a lifecycle. 5:43I mean, no matter what lifecycle you look at, whether it's NIS, the National Institute of Standards, or if you look at SANS 5:50all of the incident response lifecycles go through in a big circle. 5:53And coming full circle means learning from your past incident. 5:57If you're having an incident over and over again and it has the same attack vector, it's the same kind of incident, but you're not learning from the incident. 6:04That's why it keeps happening, because you're not taking the time to sit down with the relevant personnel and stakeholders within your organization 6:11to identify why did this incident happenand what kind of security controls do I need to put into place, whether they're technical, strategic 6:18to prevent another incident from happening again? 6:20Most organizations, they have an incident. 6:23They remediate it, meaningthey get their business back to normal operating standardsand they go about their days. 6:28They don't talk about why did this happen, how can we prevent this from happening again? What went wrong? 6:33What did we do well? 6:34these are key defining characteristics that we need to identify during incidents to help prevent them from reoccurring. 6:39Because being a victim is very expensive. Well, that is excellent advice. I want to give you the last word on this. 6:46For our people who are watching this and want to avoid being a victim, what do you really recommend they do now? 6:51Yeah, that's a great question. 6:53I recommend not waiting for the incident to happen. 6:56I recommend getting an incident response retainer, acquiring them ahead of time 7:00to prepare for an incident because the reality is 7:02all these organizations, they think, Oh, I don't want to spend, 7:05you know, a couple thousand. 7:07Well, let's be realistic. It's a lot more than a couple thousand. 7:09But they think I don't want to spend the money ahead of time for an incident that may never happen. 7:12The reality is, as the saying goes, incidents already happen to you or you don't know it's happened yet. 7:18We a cybersecurity incident response professionals literally see day in and day 7:22out these same incidents that are occurring in different environments, whether it's Linux or Windows. 7:27But we are trained professionals who are there to handle your organization's worst day 7:32while you're executives are running around like chickens with their heads cut off. 7:35We're there to be calm to help you walk through it, to help remediated and recover from itas quickly and effectively as possible. 7:42So prepare for the incident before it happens. Take the time to do it. 7:45Put a process into place and hire an incident response retainer. 7:49It'll make your life so much easier. 7:51I so much appreciate the part about being calm. 7:53Yeah, calmness is one of the key defining factors for being an incident 7:57response consultant while everyone else is just running around frantic. You know, sending angry emails, scared out of their minds. 8:04Having that person to be your pillar of strength to turn to has done this day in and day out for many years of their life. 8:10It's something that money is no trivia for. 8:14Well, thank you so much for joining us, Meg. 8:16And for those who are watching, Hey, before you leave, don't forget to hit like and subscribe.