Ransomware Protection Playbook

Book description

Avoid becoming the next ransomware victim by taking practical steps today 

Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it’s growing longer every day. 

In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You’ll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. 

In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: 

  • Quickly detect an attack, limit the damage, and decide whether to pay the ransom 
  • Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage 
  • Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business 

A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization’s, data. 

Table of contents

  1. Cover
  2. Title Page
  3. Introduction
    1. Who This Book Is For
    2. What Is Covered in This Book?
    3. How to Contact Wiley or the Author
  4. Part I: Introduction
    1. Chapter 1: Introduction to Ransomware
      1. How Bad Is the Problem?
      2. Types of Ransomware
      3. Summary
    2. Chapter 2: Preventing Ransomware
      1. Nineteen Minutes to Takeover
      2. Good General Computer Defense Strategy
      3. Understanding How Ransomware Attacks
      4. Preventing Ransomware
      5. Beyond Self-Defense
      6. Summary
    3. Chapter 3: Cybersecurity Insurance
      1. Cybersecurity Insurance Shakeout
      2. Did Cybersecurity Insurance Make Ransomware Worse?
      3. Cybersecurity Insurance Policies
      4. The Insurance Process
      5. What to Watch Out For
      6. Future of Cybersecurity Insurance
      7. Summary
    4. Chapter 4: Legal Considerations
      1. Bitcoin and Cryptocurrencies
      2. Can You Be in Legal Jeopardy for Paying a Ransom?
      3. Is It an Official Data Breach?
      4. Preserve Evidence
      5. Legal Defense Summary
      6. Summary
  5. Part II: Detection and Recovery
    1. Chapter 5: Ransomware Response Plan
      1. Why Do Response Planning?
      2. When Should a Response Plan Be Made?
      3. What Should a Response Plan Include?
      4. Practice Makes Perfect
      5. Summary
    2. Chapter 6: Detecting Ransomware
      1. Why Is Ransomware So Hard to Detect?
      2. Detection Methods
      3. Example Detection Solution
      4. Summary
    3. Chapter 7: Minimizing Damage
      1. Basic Outline for Initial Ransomware Response
      2. Stop the Spread
      3. Initial Damage Assessment
      4. First Team Meeting
      5. Determine Next Steps
      6. Summary
    4. Chapter 8: Early Responses
      1. What Do You Know?
      2. A Few Things to Remember
      3. Major Decisions
      4. Early Actions
      5. Summary
    5. Chapter 9: Environment Recovery
      1. Big Decisions
      2. Rebuild Process Summary
      3. Recovery Process Summary
      4. Summary
    6. Chapter 10: Next Steps
      1. Paradigm Shifts
      2. Improve Overall Cybersecurity Hygiene
      3. Summary
    7. Chapter 11: What Not to Do
      1. Assume You Can't Be a Victim
      2. Think That One Super-Tool Can Prevent an Attack
      3. Assume Too Quickly Your Backup Is Good
      4. Use Inexperienced Responders
      5. Give Inadequate Considerations to Paying Ransom
      6. Lie to Attackers
      7. Insult the Gang by Suggesting Tiny Ransom
      8. Pay the Whole Amount Right Away
      9. Argue with the Ransomware Gang
      10. Apply Decryption Keys to Your Only Copy
      11. Not Care About Root Cause
      12. Keep Your Ransomware Response Plan Online Only
      13. Allow a Team Member to Go Rogue
      14. Accept a Social Engineering Exclusion in Your Cyber-Insurance Policy
      15. Summary
    8. Chapter 12: Future of Ransomware
      1. Future of Ransomware
      2. Future of Ransomware Defense
      3. Summary
      4. Parting Words
  6. Index
  7. Copyright
  8. Dedication
  9. About the Author
  10. About the Technical Editor
  11. Acknowledgments
  12. End User License Agreement

Product information

  • Title: Ransomware Protection Playbook
  • Author(s): Roger A. Grimes
  • Release date: October 2021
  • Publisher(s): Wiley
  • ISBN: 9781119849124