Inside the War on Ransomware: Ricoh Danielson's Guide to Crisis Response
Release Date: 02/10/2025
Ransomware Rewind
In this episode of the Ransomware Rewind podcast, host Joe Erle (@joe_erle) interviews John Bruggeman, Chief Information Security Officer (CISO) at CBTS and OnX, on emerging cybersecurity threats like AI model poisoning and prompt injection attacks. With over 25 years of experience in cybersecurity, John explains how unsanitized inputs and as few as 250 malicious data points can cause "brain rot" or model decay in large language models (LLMs), resulting in unreliable outputs, hidden backdoors, and long-term AI vulnerabilities. John explains real-world AI attack vectors, including tool...
info_outlineRansomware Rewind
Ever wondered what handling deadly anthrax at the US Capitol has in common with battling ransomware in 2025? What if the next big cyber attack isn't from hackers in a basement—but from quantum computers shattering your encryption overnight? In this unmissable episode of Ransomware Rewind, cybersecurity legend Wil Klusovsky spills insider secrets that could save your business from total chaos. Wil, a 24-year US Marine vet turned cyber strategist (LinkedIn: /wilklu, host of Keyboard Samurai), draws chilling parallels between war and digital battles. From post-9/11 preparedness drills to why...
info_outlineRansomware Rewind
CISOs, CEOs & Business Owners: What To Say (and NOT Say) When Ransomware Hits – Or You’ll Lose Millions in Reputation 90% of companies survive the hack… but die from the crisis communications disaster that follows. Kevin Dinino (Head of Communications at top cybersecurity PR firm KCD PR) reveals the exact playbook that saved Fortune 500 companies during real breaches — and the fatal mistakes that tanked others. You’ll learn: ✅ The 48-hour rule that saves reputations (and stock prices) ✅ 3 statements that instantly destroy trust & trigger lawsuits ✅ CEO media-training...
info_outlineRansomware Rewind
What happens when a brutal ransomware attack flips your entire career upside down—and launches you into the front lines of the biggest cyber war of our time? In this explosive episode, cybersecurity advisor Nick Oles (Entoo Security) pulls back the curtain on his wild origin story: the day ransomware hit him personally, ignited an obsession, and ultimately birthed his must-read book, How to Catch a Phish. Nick doesn’t hold back. We dive deep into: How phishing has mutated into a terrifyingly sophisticated beast in 2025 Why remote and hybrid work handed attackers the keys to the kingdom...
info_outlineRansomware Rewind
In this episode of Ransomware Rewind, Joe and Mike sit down with Andrew Klucsarits, Director and IT Security and Risk Manager at IT Solutions to talk Cybersecurity including modern ransomware trends and operational security for enterprise business. They analyze high-impact supply-chain attacks (including discussion of the Dragon Force incident and vendor risks tied to tools like ConnectWise). In addition, they outline how adversaries exploit human and vendor weaknesses through social engineering exploits. Lastly, they provide pragmatic guidance for building resilient defenses using...
info_outlineRansomware Rewind
Kevin O'Neill, founder and CEO of CYVA Research Corporation dives deep into the current challenges surrounding data privacy and control, advocating for a paradigm shift towards self-protecting and self-governing data systems. He shares his vision for a more secure digital future where individuals have control over their personal information, irrespective of the device or platform. 00:00 Introduction to Data Control 01:33 The Evolution of Data Protection 02:03 Ralph Nader and Data Safety 02:58 Welcome to the Podcast 05:15 Privacy and Data Ownership 07:32 The Role of Public Cloud...
info_outlineRansomware Rewind
In this episode of the Ransomware Rewind podcast, we interviewed David Ritter, CEO and co-founder of Penta Privacy Lock. David elaborates on the complexities of privacy regulations like GDPR and CCPA amidst recent significant data breaches. He discusses the importance of privacy compliance in addition to robust cybersecurity measures and introduces Privacy Lock as a tool for mitigating the fallout from privacy breaches. 00:00 Introduction and Guest Introduction 00:49 Recent Ransomware and Privacy Breaches 01:36 Regulations and Privacy Laws Overview 03:37 Challenges in Privacy Compliance 05:20...
info_outlineRansomware Rewind
In this episode, we sit down with Chris Hood, a seasoned customer experience expert, to discuss the critical steps management should take in the event of a cybersecurity breach. Chris offers valuable insights into building and maintaining customer trust, effective communication during crises, and leveraging AI to enhance cybersecurity. Perfect for business leaders, technology enthusiasts, and anyone interested in the intersection of cybersecurity and customer experience. Don't miss this engaging conversation filled with practical advice and real-world examples. 00:00 Introduction to the...
info_outlineRansomware Rewind
Dr Chase Cunningham AKA Dr. Zero Trust goes after the "Big Cyber" and the US government telling truths about BS and mishandling sensitive and top secret data. Join us on this episode of the Ransomware Rewind podcast as we dive deep into the world of Zero Trust and current cyber events with Dr. Chase Cunningham, also known as Dr. Zero Trust. From his extensive background working with the government and armed forces Dr. Cunningham provides expert analysis on the complex landscape of digital security. We also discuss the implications of AI, the future of warfare, and the critical role of...
info_outlineRansomware Rewind
In this episode of Ransomware Rewind, I interview Alexandre Blanc, a strategic cybersecurity advisor at Alexandre Blanc Consulting, to discuss critical issues in data protection and cybersecurity. He shares practical advice for consumers and businesses to manage their digital footprints, employ multi-factor authentication, and use encrypted passkeys. We also discuss the implications of digital identities, data leaks, AI in cybersecurity, and the importance of maintaining control over personal data. Moreover, the conversation covers the future of AI, the need for public awareness, and tips to...
info_outline
Enterprise Incident Response & Crisis Management with Combat Veteran, Ricoh Danielson
In this exclusive interview, we speak with Ricoh Danielson, a U.S. Army Combat Veteran of Iraq and Afghanistan turned cybersecurity expert.
Topics in This Interview (breakdown with timestamps below)
- How businesses can prepare for and respond to cyberattacks
- Best practices for personal security to safeguard your digital identity
- Safety measures after disasters and crisis management tips
- The rise of AI-driven ransomware and its impact on businesses
- Ricoh’s military experiences and how they shaped his approach to cybersecurity
Why Watch This Video?
- Learn from Ricoh’s expertise as a digital forensics powerhouse with experience handling high-profile hacks.
- Discover practical strategies to protect your business from ransomware and other cyber threats.
- Gain insights into effective communication during a breach or disaster.
About Ricoh Danielson: Ricoh is a U.S. Army Combat Veteran with over 9 deployments across Iraq, Afghanistan, and Africa. As the founder of Fortitude Tech LLC and 1st Responder, he has worked on high-stakes cases involving hospitals, corporations, and state governments. Recently featured on NTD News discussing cyberattacks in New Orleans and Las Vegas, Ricoh is also an author and sought-after speaker in the cybersecurity space.
Chapters:
- 0:00 Intro to Ricoh Danielson: Ricoh shares his journey from military service to becoming a leader in digital forensics and cybersecurity. Learn how his combat experience shaped his approach to crisis management.
- 2:15 How Businesses Can Prepare for Cyberattacks: Practical steps to defend against ransomware, phishing, and other threats using identity access management (IAM) and conditional access policies.
- 5:30 Personal Security Tips: Actionable advice on protecting your digital identity, recognizing phishing scams, and avoiding psychological tactics used by hackers.
- 9:45 Crisis Management After Disasters: Insights into preparing for grid failures or natural disasters with go bags, alternative communication plans, and safety strategies.
- 13:20 AI-Driven Ransomware Explained: A deep dive into polymorphic ransomware powered by AI—how it works and why businesses must stay ahead of these advanced threats.
- 17:00 Lessons from Military Service Applied to Cybersecurity: How Ricoh’s military background prepared him to handle chaotic situations like ransomware attacks on hospitals and global corporations.
- 20:00 The Role of CISOs and Board Communication: Challenges CISOs face when communicating risks to boards, securing equity in companies, and leveraging D&O insurance for protection.
- 24:00 How to Break Into Cybersecurity: Advice for aspiring professionals on certifications like Network+ and Security+, as well as opportunities in governance, risk, compliance (GRC), IAM, and privilege access management (PAM).
- 28:00 Quick Wins for Improving Cybersecurity Posture: Simple strategies like enabling conditional access policies in Microsoft 365 environments or conducting Business Email Compromise (BEC) assessments.
- 31:00 Crisis Management & Incident Response Strategies: The importance of alternative communication plans during crises—Ricoh shares exercises involving burner phones and laptops for CEOs.
- 34:00 Preparing for Grid Failures & Disaster: Tips on securing six months’ worth of food/water supplies, understanding ham radios for communication, and ensuring family safety during emergencies.
- 37:00 Cybersecurity Books by Ricoh Danielson - Ricoh introduces his books, including No-Nonsense Cybersecurity (https://a.co/d/43Myc13) for practical advice, FM Field Manual (https://a.co/d/14qOL5K)as an art-focused coffee table book on cybersecurity, and Tactical Manual (https://a.co/d/iGfOBS6), a highly technical guide with step-by-step instructions.
Subscribe for more interviews like this! Comment below what you found interesting in the podcast.
🔗 Follow Ricoh Danielson on Instagram @Ricoh_Danielson or LinkedIn www.linkedin.com/in/ricoh-danielson-736a0715
🔗 Learn more about Ricoh on his website: www.ricohd.us
🔗Breakfast with a CISO on Youtube: www.youtube.com/@dricoh22/videos
🔗 Find the host, Joe Erle, at: www.linkedin.com/in/joeerle @itscyberjoe on instagram and tiktok Get the 14 steps to protecting your data PDF here: www.c3insurance.com/cyber Or you can email Joe at joe@c3insrance.com for speaking inquiries or cyber insurance quotes.
If you need cloud security solutions... our absent host, Mike Dowdy, can be found here: linkedin.com/in/mikedowdy
Cybersecurity #IncidentResponse #DigitalForensics #BusinessSecurity #AIThreats #RansomwareResponse #CISORoleInsights #AIThreatMitigation #DigitalForensicsExpertise #IncidentResponseStrategies #CybersecurityLeadership #MilitaryToCybersecurity #CrisisManagementTips #ProtectYourBusinessOnline
#AdvancedCyberThreats