S3 – Episode 014 – Navigating the Storm: Mastering Incident Response and Disaster Recovery

S3 – Episode 014 – Navigating the Storm: Mastering Incident Response and Disaster Recovery

Author: Jason Popillion and Kevin Pentecost December 26, 2024 Duration: 1:38:10

In this season finale of the Cyber Distortion Podcast, hosts Kevin Pentecost and Jason Popillion, tackle one of the most critical topics in modern cybersecurity—incident response and disaster recovery. When a cyber incident strikes, every second counts. Organizations need to be ready with well-orchestrated plans to respond effectively and recover swiftly. This episode delves deep into the strategies, tools, and best practices that every cybersecurity professional and organization should know to minimize damage and ensure resilience.

Kevin and Jason guide listeners through the intricacies of incident response, breaking it down into digestible phases like preparation, detection, containment, eradication, and recovery. They also explore the role of disaster recovery planning, highlighting how businesses can resume operations quickly and securely after a breach or significant event. The hosts share real-world examples and practical tips, making these complex processes relatable and actionable for professionals at all levels.

As the final episode of the season, this is one you don't want to miss. Kevin and Jason bring their signature blend of expertise and engaging conversation to ensure listeners walk away with a solid understanding of incident response frameworks, key roles and responsibilities, and the importance of regular testing and improvement. Whether you're a seasoned cybersecurity practitioner or just starting, this episode offers something valuable for everyone.

Thank you for joining us this season on Cyber Distortion. We've loved exploring the multifaceted world of cybersecurity with our incredible audience, and we're ending this season with a bang. We hope you enjoy this finale as much as we enjoyed creating it. Stay tuned for future seasons as we continue to navigate the dynamic and ever-evolving landscape of cybersecurity!

Jason Popillion is a CISSP and serves as a CIO/CTO of a SaaS company and Kevin Pentecost is a CISSP, CISM, CEH, CPT, MPCS, MCSE, CCA, ITIL-F and serves as the Information Security Director for a Manufacturing company.

 

MORE VALUABLE RESOURCES:

Incident Response Resources

  1. National Institute of Standards and Technology (NIST): Computer Security Incident Handling Guide
    • Resource: NIST SP 800-61 Rev. 2
    • Description: This guide provides a comprehensive framework for incident handling, detailing preparation, detection, analysis, containment, eradication, and recovery steps.
  2. SANS Institute: Incident Handler's Handbook
    • Resource: SANS Reading Room - Incident Response
    • Description: A practical guide for incident handlers, focusing on hands-on strategies for real-world scenarios.
  3. US-CERT: Incident Response Resources
    • Resource: CISA Incident Response Guidance
    • Description: A hub of information, tools, and best practices for incident response, provided by the Cybersecurity and Infrastructure Security Agency.

 

Disaster Recovery Resources

  1. Federal Emergency Management Agency (FEMA): Continuity of Operations Planning
    • Resource: FEMA Continuity Resources
    • Description: Guidance on creating disaster recovery and continuity plans for organizations of all sizes.
  2. International Organization for Standardization (ISO): ISO 22301
    • Resource: ISO 22301: Business Continuity Management Systems
    • Description: This standard focuses on managing and reducing risks during disruptive incidents.
  3. Disaster Recovery Institute International (DRI): Best Practices for Business Continuity
    • Resource: DRI Resources
    • Description: A compilation of best practices, frameworks, and tools for effective disaster recovery planning.

 

Cybersecurity Education and Training

  1. MITRE ATT&CK Framework
    • Resource: MITRE ATT&CK
    • Description: A detailed knowledge base of adversary tactics and techniques to inform incident response planning.
  2. CERT Coordination Center: Incident Management Practices
    • Resource: CERT Resources
    • Description: Research and guidance from the Software Engineering Institute at Carnegie Mellon University.

 

Additional Practical Tools

  1. Microsoft: Security Incident Response Playbooks
  2. National Cyber Security Centre (NCSC): Incident Management Guidance
  • Resource: NCSC UK
  • Description: Practical advice from the UK government's cybersecurity body on managing incidents effectively.

Ever feel like the world of cybersecurity is explained in a language only experts understand? That's exactly why Cyber Distortion Podcast Series exists. Hosts Jason Popillion and Kevin Pentecost, both seasoned professionals who hold top certifications like the CISSP, cut through the jargon and distortion to talk about digital safety in clear, practical terms. Each episode feels like a conversation with two colleagues who have been in the trenches-Jason as a CIO/CTO and Kevin as an Information Security Manager-and who genuinely want you to walk away with something useful. You won't just hear abstract theories; you'll get actionable advice that applies whether you're protecting your personal data or responsible for an entire organization's security posture. This podcast demystifies the concepts that matter now, from everyday online habits to broader organizational strategies, making crucial knowledge accessible without oversimplifying the real challenges. Tune in for straightforward discussions that equip you with the understanding to navigate an increasingly complex digital landscape with more confidence.
Author: Language: English Episodes: 60

Cyber Distortion Podcast Series
Podcast Episodes
S2 - Episode 004 - "AI and ChatGPT is Scary Sh*t! – Part II" [not-audio_url] [/not-audio_url]

Duration: 43:36
In this MUCH anticipated follow-up to our episode 003 on AI an ChatGPT, expect more mind-numbing and terrifying facts about this incredible new technology! Kevin and Jason wrap up their discussion with Justin "Hutch" Hut…
S2 - Episode 003 - "AI and ChatGPT is Scary Sh*t! – Part I" [not-audio_url] [/not-audio_url]

Duration: 55:03
What in the world does AI and ChatGPT have to do with Cybersecurity? Well, this episode is going to answer that question for you, and so much more!! In today's exciting episode, Jason and Kevin discuss the incredible wor…
S2 - Episode 002 – 2022 Breaches and Some Retrospection [not-audio_url] [/not-audio_url]

Duration: 1:21:06
In this exciting second episode of the new season, we're offering up a buffet of delicious options to feast your incessant little cybersecurity appetites on! BREACHES We start by spending time on 5 of the top breaches th…
S2 - Episode 001 – The Dark Web Revisited [not-audio_url] [/not-audio_url]

Duration: 1:14:40
WE ARE BACK! Happy 2023 friends… In this exciting episode of or BRAND NEW season 2, Kevin and Jason make good a promise from Season 1 where they go back and take a deep dive into the Dark Web. This time, we're coming wit…
S1 - Episode 014 – Women in Cybersecurity - Part II [not-audio_url] [/not-audio_url]

Duration: 42:52
There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infose…
S1 - Episode 013 – Women in Cybersecurity - Part I [not-audio_url] [/not-audio_url]

Duration: 46:00
There is a worldwide shortage of over 3 million in the ranks of cybersecurity professionals, with half a million of that shortage in North America alone. The problem is only expected to get worse as the demand for infose…
S1 - Episode 012 – Unraveling the Zero Trust Mystery [not-audio_url] [/not-audio_url]

Duration: 1:22:23
If you're like many others in information security, you too may struggle with understanding the concept and basic premise of "zero trust." Well, we have good news for you! After this episode, you can rest-assured that we…
S1 - Episode 011 – The Fine Art of Social Engineering [not-audio_url] [/not-audio_url]

Duration: 1:07:03
In this exciting episode, we cover the very fascinating topic of "Social Engineering" aka: Human Hacking! Anyone that lives in Cybersecurity knows that the weakest link in any company's cyber defenses is sitting between…
S1 - Episode 010 – Doomsday Breach Prepping - 101 [not-audio_url] [/not-audio_url]

Duration: 53:10
When the world comes crumbling down and your entire existence is burning to the ground, will you be prepared to handle it? What am I talking about anyway? The post-breach apocalypse, of course. What else?! You see, we ha…
S1 - Episode 009 – #Badgelife ft. AND!XOR [not-audio_url] [/not-audio_url]

Duration: 1:19:29
Electronic Blinky-Bling?!! What the heck is that?! Take a quick walk around the Las Vegas strip around mid-summer at the DEFCON Hacking/Security Conference and you'll find out pretty darned quick! #BADGELIFE is a sub-cul…