A Visual Of What A Real Cyber Attack Looks Like

A Visual Of What A Real Cyber Attack Looks Like.jpg

This episode of At The Edge is made possible by the generosity of our sponsor, Edgescan.

By Sean Martin, host of At The Edge

Risk management can be hard — and not because of the unlimited number of things that could go wrong from a cyber perspective. Rather, because it’s difficult to figure out which risks are real and which of those risks are relevant to your organization.

To that end, I was thrilled to connect again with John Grim, Senior Manager, Investigative Response at Verizon to look at the Verizon Data Breach Digest cases and how they can help organizations operationalize their risk and security management programs.

Following the details captured in the scenarios, John paints some pictures for us to chew on, breaking down how the attacks originate, how the target is reached, how the internal victims and stakeholders are impacted, how companies can respond, and how non-victim organizations can prepare and protect their business from a similar attack.

After listening to our conversation, I would encourage you to take a look at these cases and use them as a resource to define, implement and validate your risk and security management programs.

About John Grimm


John, the primary author of the Verizon Data Breach Digest, has over 15 years of experience investigating data breaches and cyber security incidents within the government and civilian security sectors. Currently, John serves as a part of the Verizon Threat Research Advisory Center (VTRAC) and leads a team of highly skilled digital forensics investigators. In this capacity, John responds to cybersecurity incidents, advises on data breach containment and eradication efforts, performs digital forensic examinations, and leads data breach response preparedness training and breach simulation tabletop exercises for customers worldwide.

Find John on LinkedIn.