Chapter

The Importance of Monitoring After a Cybersecurity Breach
listen on Spotify
17:38 - 21:48 (04:09)

A cybersecurity remediation process should be followed by continuous monitoring for the possible return of the threat actors. Companies should shift their thinking and start addressing the issue of intellectual property theft, as it can be just as damaging as a security breach.

Clips
The monitoring and remediation phases that follow a cyber attack give companies a chance to discover any missed threats and be on high alert for future attacks.
17:38 - 20:48 (03:09)
listen on Spotify
Cybersecurity
Summary

The monitoring and remediation phases that follow a cyber attack give companies a chance to discover any missed threats and be on high alert for future attacks. Companies have come to expect state-sponsored groups as a means of due diligence for due diligence.

Chapter
The Importance of Monitoring After a Cybersecurity Breach
Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries
The speaker believes that cybercrime is mostly theft of intellectual property and that it's just another form of stealing that happens in the business world every day.
20:48 - 21:48 (00:59)
listen on Spotify
Cybercrime
Summary

The speaker believes that cybercrime is mostly theft of intellectual property and that it's just another form of stealing that happens in the business world every day. Companies need to start thinking differently about how these groups and their sponsors operate, as it's all about the money.

Chapter
The Importance of Monitoring After a Cybersecurity Breach
Episode
Ep 11: Strictly Confidential
Podcast
Darknet Diaries