Chapter
The Importance of Monitoring After a Cybersecurity Breach
A cybersecurity remediation process should be followed by continuous monitoring for the possible return of the threat actors. Companies should shift their thinking and start addressing the issue of intellectual property theft, as it can be just as damaging as a security breach.
Clips
The monitoring and remediation phases that follow a cyber attack give companies a chance to discover any missed threats and be on high alert for future attacks.
17:38 - 20:48 (03:09)
Summary
The monitoring and remediation phases that follow a cyber attack give companies a chance to discover any missed threats and be on high alert for future attacks. Companies have come to expect state-sponsored groups as a means of due diligence for due diligence.
ChapterThe Importance of Monitoring After a Cybersecurity Breach
EpisodeEp 11: Strictly Confidential
PodcastDarknet Diaries
The speaker believes that cybercrime is mostly theft of intellectual property and that it's just another form of stealing that happens in the business world every day.
20:48 - 21:48 (00:59)
Summary
The speaker believes that cybercrime is mostly theft of intellectual property and that it's just another form of stealing that happens in the business world every day. Companies need to start thinking differently about how these groups and their sponsors operate, as it's all about the money.