El Diario del CISO El Diario del CISO (The CISO Journal) Edición 25 | Page 4

Influencers Samuel Liles Adventurer, CISO, Soldier, Marine, Tribal Officer, Deputy Attribution of cyber adversaries Key Points: Attribution has three distinct layers; political, technical, and forensic with each having different confidence levels and analysis strategies Adversaries must interact with systems to exploit them and this creates evidence or anomalies that can be used for attribution Evidence can be tampered with but there are corresponding sensing systems that remain outside of adversary control that can be used for audit Root cause blame for an incident rarely is a technical implementation or user action but attribution remains the way to identify the threat Three phases of attribution and corollary levels of confidence in attribution. The complete article is here Silka Gonzalez CPA CISSP CITP QSA Threat Alert: Ransomware Attacks Cause More Turmoil Editor’s Note: ERM, a leading cybersecurity company, is seeing an increase in the number of ransomware attacks in Florida. This article will help your organization understand how these attacks occur and provide guidance on countermeasures. You’re surfing the Internet when, all of a sudden, a pop-up shows up saying that your computer and data are locked until you pay a ransom. This is what most people know about Ransomware. In reality, criminal coders are finding new and inventive ways to extort organizations. Currently, there are two major kinds of ransomware – one that encrypts your data and the other that locks you out of the operating system, so you can’t access your system and the files on it. The complete article is here