loader from loading.io

039| Deconstructing the Dukes: A Researcher's Retrospective of APT29

Cyber Security Sauna

Release Date: 05/06/2020

058| Paths to Infosec: From ER to IR show art 058| Paths to Infosec: From ER to IR

Cyber Security Sauna

When it comes to getting into cybersecurity, the skills can be learned, and it's all about hard work and dedication. Our guest this episode, incident response consultant Eliza Bolton, successfully transitioned to cybersecurity from the nursing profession. Also joining is Matt Lawrence, F-Secure's head of IR. Matt and Eliza discuss tackling the cyber skills shortage, why diverse teams are more adaptable, and why Eliza’s background as a nursing assistant is an asset in the world of incident response. 

info_outline
057| Dark Web: The Good, the Bad, and the Ugly show art 057| Dark Web: The Good, the Bad, and the Ugly

Cyber Security Sauna

After data breaches and ransomware attacks, we often hear that customer information was leaked to the dark web. This obviously can have serious implications for both companies and individuals, but for many of us, the dark web is as mysterious as it sounds. So what is the dark web all about, and what's happening there? How does it affect companies and regular people? F-Secure's Laura Kankaala and Elias Koivula join the show to help to help demystify the topic.

info_outline
056| To Ban or Not to Ban? Ransomware Payment Regulation show art 056| To Ban or Not to Ban? Ransomware Payment Regulation

Cyber Security Sauna

Ransomware payment amounts have skyrocketed over the past year. As threat actors keep getting richer, they have more resources to fuel their operations. Many people argue that the way to discourage ransomware is to implement an outright ban on ransom payments. Is this suggestion idealistic or realistic? How would such a ban affect companies, and what are the alternatives? Päivi Tynninen of the Finnish National Cybersecurity Center and Jordan LaRose of F-Secure join us to share their views.

info_outline
055| When AI Goes Awry show art 055| When AI Goes Awry

Cyber Security Sauna

AI and machine learning are shaping our online experience, from product recommendations, to customer support chatbots, to virtual assistants like Siri and Alexa. These are powerful tools for enabling business - but powerful doesn't mean perfect. F-Secure data scientist Samuel Marchal and security consultant Jason Johnson join Janne for this episode to talk about some of the security issues with machine learning and how to address them.

info_outline
054| Ransomware Incident Response and the Role of Readiness show art 054| Ransomware Incident Response and the Role of Readiness

Cyber Security Sauna

The fallout from a ransomware attack is every organization's worst nightmare. But it doesn't necessarily have to be, if you can respond to an attack effectively. As our guests explain, there are things companies can be doing in advance to ensure a proactive response to ransomware, and to reduce the impact to the company. Incident response experts Jordan LaRose and Matt Lawrence of F-Secure join the show to discuss.

info_outline
053| How to Secure Networks and Influence People show art 053| How to Secure Networks and Influence People

Cyber Security Sauna

The role of a chief information security officer demands technical knowledge, but it also requires soft skills of leading and influencing. So how can CISOs get their security message across to boards, the business, employees and the security team? Joining Janne are two CISOs, Erka Koivunen of F-Secure and Chani Simms, co-founder of Meta Defence Labs and founder of SHe CISO Exec community, to discuss communication and the role of emotional intelligence in promoting a culture of security at every level.

info_outline
052| Challenges in Cloud Security show art 052| Challenges in Cloud Security

Cyber Security Sauna

Cloud computing was one of the last decade's most transformative technologies. It helped organizations launch exciting new applications and services, as well as innovate the way they operate. But moving critical parts of IT infrastructure and operations outside of organizations' perimeters has significant security implications. The cloud is definitely here to stay, so security consultants Laura Kankaala and Nick Jones join Janne to talk about the cloud security challenges organizations face.  

info_outline
051| Looking at Phishing Through the Intrusion Kill Chain show art 051| Looking at Phishing Through the Intrusion Kill Chain

Cyber Security Sauna

Phishing is the number one vector leading to data breaches. It's an easy, effective way for attackers to trick users into giving up credentials or running malicious code. While organizations cannot stop motivated attackers from trying to phish their employees, they can make it harder to succeed. F-Secure's director of consulting, Riaan Naudé, joins the show to talk about how companies can combat phishing by addressing the earlier stages of the intrusion kill chain.

info_outline
050| Getting the Most out of Infosec Conferences show art 050| Getting the Most out of Infosec Conferences

Cyber Security Sauna

Infosec conferences give cybersecurity professionals a chance to network, hear the latest research, exchange ideas, and demo hacks and new tools. But how do you decide which ones to attend? How can you get the most out of your experience? Are they worth your time and money? What's it like to be a presenter, or even an organizer? Janne speaks to Noora Hammar of the Nordic security event Disobey and the HelSec Association; and F-Secure's Tomi Tuominen, founder of the T2 infosec conference.

info_outline
049| Ransomware 2.0, with Mikko Hypponen show art 049| Ransomware 2.0, with Mikko Hypponen

Cyber Security Sauna

We thought locking up data and demanding a fee to decrypt it was bad. But ransomware criminals have stooped even lower and now, threats of public data exposure on top of ransom demands are routine. What's next? Where's ransomware 2.0 going in 2021? F-Secure's chief research officer Mikko Hypponen joins us to give his take. Also in this episode: Ransomware's evolution, why it's mainly a Windows problem, the impact of remote work, how ransomware's industrialization affects the threat landscape, and more.

info_outline
 
More Episodes

APT29, aka Cozy Bear or the Dukes, is a cyber espionage group whose misdeeds include famously hacking into the DNC servers in the run-up to the 2016 US election. Now, as the subject of MITRE's latest ATT&CK Evaluation, the group is in focus again. The Dukes are familiar to F-Secure's Artturi Lehtio, who extensively researched them in 2015. But hindsight is 20/20, and Artturi joins the show to discuss how his views on the group have changed since his research. 

Also in this episode: How APT groups behave after being burned and why the Dukes are different; why calling them a single organization is too strong; and why published APT research has generally dwindled in recent years.

Links:

Episode 39 transcript

The Dukes: 7 Years of Russian Cyberespionage - F-Secure whitepaper

MITRE ATT&CK Evaluation: APT29

Operation Ghost - ESET

No Easy Breach by Matthew Dunwoody & Nick Carr - DerbyCon 2016

Dukes activity after their "return" in 2016 - Volexity