Life after Breach: 5 steps to recover from a cyber attack

By |2017-10-05T14:50:12-07:00August 18th, 2015|Cybersecurity|

It seems only fitting to have a post-Black Hat reflection on post-attack recovery. In her presentation How to Implement Security after a Cyber Security Meltdown, Christina Kubecka outlined the recovery efforts she helped implement after the 2012 cyber attack on Saudi Aramco. Chicken Little! Chicken Little! Your network just got pwned! For those unfamiliar with [...]