El Diario del CISO El Diario del CISO (The CISO Journal) Edición 25 | Page 4
Influencers
Samuel Liles
Adventurer, CISO, Soldier, Marine, Tribal Officer, Deputy
Attribution of cyber adversaries
Key Points:
Attribution has three distinct layers; political, technical, and forensic
with each having different confidence levels and analysis strategies
Adversaries must interact with systems to exploit them and this
creates evidence or anomalies that can be used for attribution
Evidence can be tampered with but there are corresponding sensing
systems that remain outside of adversary control that can be used
for audit
Root cause blame for an incident rarely is a technical implementation
or user action but attribution remains the way to identify the threat
Three phases of attribution and corollary levels of confidence in
attribution.
The complete article is here
Silka Gonzalez
CPA CISSP CITP QSA
Threat Alert: Ransomware Attacks Cause More Turmoil
Editor’s Note: ERM, a leading cybersecurity company, is seeing an
increase in the number of ransomware attacks in Florida. This article
will help your organization understand how these attacks occur and
provide guidance on countermeasures.
You’re surfing the Internet when, all of a sudden, a pop-up shows up
saying that your computer and data are locked until you pay a
ransom. This is what most people know about Ransomware. In
reality, criminal coders are finding new and inventive ways to extort
organizations. Currently, there are two major kinds of ransomware –
one that encrypts your data and the other that locks you out of the
operating system, so you can’t access your system and the files on
it.
The complete article is here