Repelling a ransomware attack: glen day of nvisionx on the 5 things you need to do to protect…

Medium

Repelling a ransomware attack: glen day of nvisionx on the 5 things you need to do to protect…"


Play all audios:

Loading...

> You first need to know what data matters most. Across the > enterprise, everything is a target. Don’t get overly focused on > just protecting regulated data. If you are a 


high-tech company, you > really want to protect your IP. If they target a high-tech company, > they will likely get more money by selling their IP than getting > ransom for customer


 privacy data. R_ansomware attacks have sadly become commonplace and increasingly more brazen across organizations of all sizes. Huge enterprise businesses, gas pipelines, universities and


even cities have been crippled by ransomware and forced to pay huge ransoms. What can a business do to prevent and recover from a ransomware attack?_ _In this interview series, we are


talking to cybersecurity experts who has shared insights from their experience and expertise about the “5 Things You Need to Do to Protect Yourself or Your Business From A Ransomware


Attack.” As a part of this series, I had the pleasure of interviewing__ __Glen Day__, __Founder and CEO of NVISIONx, an innovative, smart data company that solves the challenges as to why


breaches continue to happen and what makes privacy compliance so difficult._ _Founded in 2018, NVISIONx’s Nx Platform is changing the game to shifting business, Cyber and IT leaders by


empowering them to better control their data (proactive) rather than the data controlling them (reactive). The Platform broadens the focus beyond risk and compliance to include major cost


reductions and identification of new value from existing information assets. By visually profiling business and cyber data, our customers can better protect their most valuable data assets


while also disposing of data liabilities that may be toxic or have no value._ _Glen has extensive experience in both leading operational programs as well as being a trusted advisor to some


of the biggest companies in the world. His extensive client and operational experiences have shaped his perspectives to help him change the way companies see and manage data. Prior to


NVISIONx, he spent more than eight years at Ernst & Young LLP (EY) as a Cybersecurity & Privacy Partner with a strong emphasis on intellectual property (IP) protection and other


high-value information assets._ _As a retired US Navy Commander who specialized in Information Warfare, and as Los Angeles County’s first Chief Privacy Officer, Glen knows what it means to


design and implement effective data controls in very large and complex organizations. His professional experience and foundation have provided him with the operational focus and unique


experiences to develop the strategic vision for the Nx Platform._ _Glen has a Bachelor of Science Degree in Applied Mathematics from the University of Southern California and obtained his


Master’s in Information Management Systems from the Naval Postgraduate School. He is passionate about helping business, privacy, and cybersecurity professionals make more informed decisions


on what data to protect and what to purge._ THANK YOU SO MUCH FOR JOINING US IN THIS INTERVIEW SERIES! BEFORE WE DIG IN, OUR READERS WOULD LIKE TO GET TO KNOW YOU. CAN YOU TELL US A BIT


ABOUT HOW YOUR CAREER CHOICES LED TO WHERE YOU ARE NOW? After graduating from University of Southern California, I was commissioned as an officer in the US Navy and retired as a Commander in


Information Warfare. I took a number of leadership roles with Accenture Booz Allen Hamilton and later had the privilege of being the first Chief Privacy Officer for LA County. I was also


involved in three other high-tech startups that were acquired by AOL and Sun Microsystems. Throughout my career, I was always involved in dealing with massive data sets that were dispersed


across very complex networks and applications. Data is the bloodline that fuels everything- from strategic business decisions through some of the world’s most innovative products and


services. Knowing how to best protect those digital assets is my passion and we’re on a new journey to finally switch the game from companies being cyber victims and become victorious data


defenders. IS THERE A PARTICULAR STORY THAT INSPIRED YOU TO PURSUE A CAREER IN CYBERSECURITY? WE’D LOVE TO HEAR IT. Having led a number of cybersecurity operations in the military, I’ve had


extensive exposure to a lot of highly sensitive data that included some of the nation’s most confidential information. If this highly sensitive data was breached, the impact would be much


more detrimental than a regulatory fine. Information security, as we called it back then, was in the very early stages, but I realized that data security would eventually be crucial for


every company. This epiphany allowed me to reinvent myself and transition from a strictly technical operations role to one that could leverage my expertise in the commercial realm. It was


indeed something that I evolved into rather than saying, “Hey, let me quit my day job and do this!” Initially, it was more of a collateral duty that eventually became my passion in which I


never tire of finding creative solutions to very complex cyber concerns. CAN YOU SHARE THE MOST INTERESTING STORY THAT HAPPENED TO YOU SINCE YOU BEGAN THIS FASCINATING CAREER? I was working


for a leading high-tech company during an $8 billion intellectual property sale to another global software company. The transaction had an aggressive acquisition timeline with substantial


financial penalties if it was not done right and on time. The opportunity was a massive data carve-out for about five billion files distributed globally across 13 different data centers and


then sorting the data in terms of the merger & acquisition agreement. Even though the data the core focus was on intellectual property (IP), there was also a need to address legal


contracts, business strategies, financial documents, employee data, etc. The goal was to determine which information belonged to our party and which to the other party, as well as how much


data was either useless or potentially legally toxic. Per the agreement, it needed to be done within 90 days. If it were not done within that time, there would be an $100 million penalty for


every month of delay after the deadline. Those search and classification challenges inspired the concept of “purge the junk and protect the jewels.” In the end, we successfully completed


the initiative with great success and ahead of schedule in which both companies accepted the final data disposition plan without concern and the deal was completed ahead of schedule. This


reaffirmed a model I had been conceptually working on for decades and finally got to prove its feasibility. YOU ARE A SUCCESSFUL LEADER. WHICH CHARACTER TRAITS DO YOU THINK WERE MOST


INSTRUMENTAL TO YOUR SUCCESS? CAN YOU PLEASE SHARE A STORY OR EXAMPLE FOR EACH? You have to be a thought leader first. That’s something that many people assume — that they are experts in


their field but many struggle to offer new insights other than best practices. That leads me to my second point: you also need to have leadership acumen. You have to be a leader and have the


capacity to personally step up and take point. You don’t get always get selected and at times you have to just take the reins and say, “I’m going to work with my team members to do what it


takes to achieve a certain vision that will deliver meaningful outcomes.” Finally, you have to be a ‘people person.’ You can be the greatest thought leader in the world; you can have the


greatest attitude, but if your people don’t trust you, if your people don’t follow you, then there is no one to lead. So those are the three things that I believe make a true leader.


Typically, if you do that, then you are going to build a phenomenal team around you. ARE YOU WORKING ON ANY EXCITING NEW PROJECTS NOW? HOW DO YOU THINK THAT WILL HELP PEOPLE? Right now, we


are focused on helping companies to gain greater data visibility to better understand their massive data stores to make better decisions of what to protect and what to purge. A key part of


that is creating a complete and actionable view of their data. Not some of it, but all of it. This involves having business leaders and cyber teams work together to protect what matters


most. This starts with a data-first approach and helping business professionals become their own data analysts in identifying which data is most valuable, where it’s stored, and who should


have access. Once they iron out those details, this informs the cyber team how to reconfigure data protection controls based on this crucial business context. When controls have the proper


business rules, they work more effectively and with dramatically less false alarms. This is how data protection is done right and more proactively. FOR THE BENEFIT OF OUR READERS, CAN YOU


BRIEFLY TELL OUR READERS WHY YOU ARE AN AUTHORITY ABOUT THE TOPIC OF RANSOMWARE? I have been dealing with cyber-attacks in large, complex companies for a few decades. I’ve seen the evolution


of ransomware and other sophisticated malware attacks upfront and the detrimental impact that it has had. I’ve had close experiences with companies who’ve been forced to play the game of


“Okay we’ve just been hacked and are demanding massive payments in bitcoin to avoid further pain, now what?” Ransomware in particular was always supposed to be mitigated much in the same way


as if a natural disaster, fire or earthquake had occurred. Retire the affected system, restore from backup and bring it back online to continue operations. The fact that at times it’s


easier to pay the ransom than to recover from backup data is a clear sign that companies are struggling to better control and understand their massive data stores. OK SUPER. THANK YOU FOR


ALL THAT. LET’S NOW SHIFT TO THE MAIN FOCUS OF OUR INTERVIEW. IN ORDER TO ENSURE THAT WE ARE ALL ON THE SAME PAGE, LET’S BEGIN WITH SOME SIMPLE DEFINITIONS. CAN YOU TELL OUR READERS ABOUT


THE DIFFERENT FORMS OF RANSOMWARE ATTACKS? Today’s ransomware attacks are typically multi-faceted and often well-planned. They’ll either encrypt your data in place or say, “if you don’t pay


the ransom, I’m going to post it on a public site like WikiLeaks.” They may also delete the original files or databases and store a copy somewhere else — truly like a ransom. In either case,


they will then add pressure for a timely payment to include threatening to publicly shame the affected company or release other cyberattacks such as denial of services attacks that prevents


access to their websites The hackers are highly motivated and will continue to create new ways to do very bad things. It’s also hard to say that even if you pay the ransom, you can now


trust the data that was manipulated by the untrusted source. The hacked data may have been tampered with including having new ransomware for a follow-up attack. You paid once. Why wouldn’t


you pay again? WHO HAS TO BE MOST CONCERNED ABOUT A RANSOMWARE ATTACK? IS IT PRIMARILY BUSINESSES OR EVEN PRIVATE INDIVIDUALS? I think anyone who stores valuable data should be concerned


about no longer having access to it. If that data were to get posted on WikiLeaks, would companies have a reason to be concerned? That is the litmus test. Ransomware attacks have now become


a billion-dollar business. The bad guys are taking a business approach to optimize their returns. They are now looking at your cybersecurity insurance policy to determine what’s the maximum


ransom they can get out of the business or their insurers. WHO SHOULD BE CALLED FIRST AFTER ONE IS AWARE THAT THEY ARE THE VICTIM OF A RANSOMWARE ATTACK? THE LOCAL POLICE? THE FBI? A


CYBERSECURITY EXPERT? I don’t know what the police can do. The practices that corporations should implement around backing up their data are the same things that individuals should be doing.


These leading practices have been shared with both corporations and individuals for decades. When it comes to corporations, they pull out the incident response playbook. The first questions


will be, “What just happened? What data was compromised? Where are they now? “ Their whole playbook is to identify, contain, isolate it so that it does no further damage. But then, as they


do this, they also notify the legal team. Legal has to tell the communications team as well as the board members. It becomes a reputational concern because, more than likely, this will be in


the media for the wrong reasons. IF A COMPANY IS MADE AWARE OF A RANSOMWARE ATTACK, WHAT ARE THE MOST IMPORTANT THINGS THEY SHOULD DO TO PROTECT THEMSELVES FURTHER, AS WELL AS PROTECT THEIR


CUSTOMERS? Figuring this out in the middle of the breach is not the best time. The attack has occurred, and the damage has been done. What you should be thinking about is, “There may be an


attack tomorrow, what should I do? Can we actually recover? Is our plan in place feasible?” What many companies are doing now is “smart backups.” That is, doing what they need to do to


recover and get back in operation — instead of backing up everything. It’s important to determine what those critical functions and processes are. SHOULD A VICTIM PAY THE RANSOM? PLEASE


EXPLAIN WHAT YOU MEAN WITH AN EXAMPLE OR STORY. That is absolutely a business determination and there is no one answer that fits all situations. If you did what you needed to do and can


recover, you may not need to pay the ransom. However, if they took data that they can effectively publicly post and the repercussions of that being shared is huge, then probably you may want


to pay. Again, this is a business risk decision that should have been played in prior war gaming practices. WHAT ARE THE MOST COMMON DATA SECURITY AND CYBERSECURITY MISTAKES YOU HAVE SEEN


COMPANIES MAKE THAT MAKE THEM VULNERABLE TO RANSOMWARE ATTACKS? Most companies have actually done a good job to put in malware detection tools. However, cyberhackers are really sophisticated


in their attacks. The first truly secure way to counter that is to focus on your most sensitive data and then ensure that it’s closely monitored and well-protected. However, many companies


are overwhelmed by their large data stores and take an impossible “protect it all” approach which never works. WHAT WOULD YOU RECOMMEND FOR THE GOVERNMENT OR FOR TECH LEADERS TO DO TO HELP


LIMIT THE FREQUENCY AND SEVERITY OF THESE ATTACKS? You can’t force the government to regulate a business strategy — that would be overreach. But what the government _CAN _really do is share


threat intel and viable solutions as well as give more examples of what companies should be doing versus general guidance. They should be industry specific as well as small business


specific, so you are not treating the small companies with limited resources like a Fortune 100 that should have much greater resources and capabilities to deal with this. OK, THANK YOU.


HERE IS THE MAIN QUESTION OF OUR INTERVIEW. WHAT ARE THE “5 THINGS YOU NEED TO DO TO PROTECT YOURSELF OR YOUR BUSINESS FROM A RANSOMWARE ATTACK” AND WHY? (Please share a story or example for


each.) * You first need to know what data matters most. Across the enterprise, everything is a target. Don’t get overly focused on just protecting regulated data. If you are a high-tech


company, you really want to protect your IP. If they target a high-tech company, they will likely get more money by selling their IP than getting ransom for customer privacy data. * Back up


strategically and intelligently versus backup everything. Because when you need to recover, it is a time critical event, and if you are not backing up the data in a timely way to recover


from a disaster, then you are going to pay the cost one way or the other. * Test the backup — not just through using tabletop exercises. You should actually have planned failover tests to


truly get the confidence that if one system fails, you can reliably recover. * You need to know that you have the proper controls in place to detect an event from happening early. * Monitor


and be vigilant. There are numerous ways, early in the cyber kill chain, to detect and then contain an event from happening. The attacks never happen overnight. The bad guys are there for


weeks, if not months, collecting the intel and preparing for the exploit before executing the actual breach. YOU ARE A PERSON OF ENORMOUS INFLUENCE. IF YOU COULD INSPIRE A MOVEMENT THAT


WOULD BRING THE MOST AMOUNT OF GOOD TO THE MOST AMOUNT OF PEOPLE, WHAT WOULD THAT BE? YOU NEVER KNOW WHAT YOUR IDEA CAN TRIGGER. :-) My biggest thing is, know your data and don’t be a data


hoarder. Keeping everything forever can come back and bite you. HOW CAN OUR READERS FURTHER FOLLOW YOUR WORK ONLINE? For more information, please visit www.nvisionx.ai THIS WAS VERY


INSPIRING AND INFORMATIVE. THANK YOU SO MUCH FOR THE TIME YOU SPENT WITH THIS INTERVIEW!


Trending News

Muslim Women Group Says Their Petition To End Triple Talaq Has Collected 50,000 Signatures

Mumbai-based NGO, Bharatiya Muslim Mahila Andolan (BMMA) has sought the support of the National Commission for Women (NC...

Southern california wildfires: new blaze erupts at camp pendleton

Reporting from San Diego — As firefighters began to get the upper hand on several wildfires in San Diego County, a new b...

Scott asks epa to delay fla. Water pollution rules

Florida's incoming governor and other newly elected Republicans on Friday joined a chorus of politicians and others...

State of the State - The Texas Observer

Abbott’s Familiar Priorities Include Property Taxes, Vouchers, Cracking Down on Bail In his biennial address, the govern...

Javascript support required...

Latests News

Repelling a ransomware attack: glen day of nvisionx on the 5 things you need to do to protect…

> You first need to know what data matters most. Across the > enterprise, everything is a target. Don’t get overly...

Pfizer Vaccine Trial Is A ‘Triumph’, Results Published In Journal

The complete results of the clinic trial for the US-based pharmaceutical giants Pfizer and BioNTech have been published ...

Pigmeat ad row rumbles on - Farmers Weekly

- 19 May 2000 https://www.fwi.co.uk More in News Pigmeat ad row rumbles on - 19 May 2000 >More in NewsBy Peter CrichtonT...

Car racing kills youngster in kerala? 24-yr-old dead after his speeding car hit auto

The women who were in the car have been identified as Gauri Lakshmi Subramaniam, Ananya and Silpa, all in their early 20...

Miami Dolphins are in advanced talks to sell minority stake in team to Ares Management, billionaire Joe Tsai

The Miami Dolphins are in advanced talks to sell a minority stake in the team to private equity firm Ares Management and...

Top