#Vault7 Happened. There’s No Going Back. But We Do Have Tips.

This webinar recap chronicle brought to you by:

With conversation, and confusion, and worry brewing after the WikiLeaks Vault 7 incident, I found it to be a good time organize a panel of experts that could help us all get a handle on what happened, what didn't happen, and what the impact on society could be.

The full panel discussion, along with additional questions and answers not covered during the live panel, can be found and watched here: #Vault7 Happened. There’s No Going Back. Now What?

As part of the original planning for the panel, I asked the experts to provide our audience with some actionable tips. This chronicle captures those tips. Enjoy!

Nick Bilogorskiy, Sr. Director of Threat Operations, Cyphort

  1. Upgrade your breach detection tools to include a platform that has visibility into web, email and lateral vectors for threats payloads and communication, can catch zero-day attacks by behavior; uses deep learning analytics and correlates alerts from all security vendors into a timeline view.
  2. Train your staff on recognizing phishing. I talked to a large company last week where phishing open rate decreased from 30% to 5% after cybersecurity training.
  3. Use multi-factor authentication by default, stop using passwords alone (https://medium.com/@nickbilogorskiy/no-more-secrets-why-passwords-are-the-new-exploits-abeeef0bc55e#.n9um3eh21).
  4. Backup your critical data offsite to be safe from ransomware (https://www.brighttalk.com/webcast/14473/222271).
  5. Obtain data breach insurance, you will need it.


Tony Busseri, CEO, Route1 Inc.

  1. Disable all in bound ports and all unnecessary outbound traffic
  2. Properly configure your internet gateway, router and WiFi access point – follow best security practices
  3. Consider doing your random browsing of the internet from a separate PC/mobile device that is not on your internal home network
  4. Use multi-factor authentication
  5. Cover or point away any video cameras when not in use


Darin Andersen, Chairman & Founder, CyberTECH

  1. Practice Cyber Hygiene - passwords, encryption, careful sharing and "Stop" "Think" "Connect". Update your software.
  2. NEW IDEA 💡 Return to "Trusted Communities", the roots of the Internet.  Companies like Authenticated Reality www.authenticatedreality.com are creating Internet space where identity and trust  is highly assured.
  3. http://www.xconomy.com/texas/2017/02/13/amid-fake-news-authenticated-reality-launches-the-new-internet/