Ransomware Attack: How Cybersecurity Insurance Impacts Response By Dan Lohrmann and Bikash Barai

Dan Lohrmann a Cybersecurity Leader| CxO Advisor | Bestselling Author and Bikash Barai Co- founder @ FireCompass and CISO Platform, a discussion on a real-life ransomware attack where the company's cybersecurity insurance provider negotiated the ransom down, but also limited the payout - highlighting the complexities companies face when responding to such incidents.

 

 

Here is the verbatim discussion: And it was like about a safe. I'm not going to give you too many details, but the story makes sense as I go through this. Like, it was about a $5 million request. They had. They had encrypted all their data. They had no access to anything. Their backups were encrypted. They had not done a good job of separating their backups, and they hadn't done a good job. A lot of people have backups, but they don't test the backups. And so the bad actors get in, and they actually encrypted the backups as wil. So they were kind of, you know, up a creek. They didn't want to pay. They didn't want to pay. They had cyber insurance. And in the US, the cyber insurance company said, look, they came in, this is your decision. It's always the company's decision. But we know these people, and we' going to negotiate it down to 1.2 million. We know we can get these guys down from five to 1.2. So they already, like, the cyber insurance company, had the playbook, right? So we're going to negotiate this down to 1.2 million. And, oh, by the way, if you don't do that, we're only going to give you, even though their cyber insurance policy was actually for 5 million, we're only going to give you 1.2 million. And we think it's going to cost you, like, 8 million to restore all your systems and everything you have to do. So they almost felt like, and again, I'm not saying this is always true with cyber insurance. They almost felt like they had to pay. They had to go with what the cyber insurance company wanted to do to get their data back. So sure enough, you know, the cyber insurance paid the 1.2 million. They got their most of their data back. They still had some problems, and then they were able to restore the systems and go from there. But, you know, the requirements from the cyber insurance company, it plays into a lot of these scenarios for a lot of companies. The other thing I'll mention,  I don't know if you saw the headline a few weeks ago, there was a company in the United Kingdom that had a big ransomware. They paid out millions of pounds and then they didn't do anything. And two weeks later they got hit again. The exact same people. So it's like the guy. It's almost like your story of getting the two potatoes in the bag. I mean, it's like they paid. They paid the ransom, they got the keys back, they got their data back, but they're, I don't know if they were, you know, all went on vacation or what they did, but they did. They weren't, they weren't ready. Maybe they put together a plan for what we're going to do, you know, a year from now. But they didn't have a year. I mean, they had, you know, get on it when their data came back, they paid the ransom, and then, guess what? You know, they got hit again and paid twice. That's a funny story all over the. Papers in the UK. You can read about it. Yeah. So then one interestin kind of takeaway from what you mentioned and also the kind of problem which I faced, the reason why I decided to kind of break down the drill into two parts was because the team never did something like this before and we wanted some real outcome and we wanted them to come prepared. And what you mentioned, something which I kind of noticed while you were telling it, was that when you do this exercise in one go. vou expect everybody to come  prepared with their plans. So I think that's a very important thing that these crisis drills, in order to be successful, the teams need to have that right background beforehand. They need to come with some level of preparedness and planning and not just get in, because that's not going to be a recipe for success. So back to this recipe for success. Dan, any, any of your suggestions in terms of do's and  don'ts in order to make these tabletop exercises successful, one is like this, preparation. Right. So this is something very important. Any other thing which you suggest. Yeah, but just add one more quick thing to that. I have a couple here I can go over. But preparation, we always had read ahead materials, so it was like real life scenarios, people, you know, or it could be like, here's what happened at this other company, here's what happened at a competitor of ours, or here's what happened. Maybe you want to do it in the same industry and or materials. Like before you even started the exercise, you kind of gave the intelligence. But again, this may be not a real situation, but, like, here's what's happening in the world. You know, for an oil company, the price of oil has plummeted, yada. Kind of preparing people in advance for the scenario that's gonna hit them on the day of the exercise. So, yeah, I mean, definitely that should always be part of the preparation and making sure people who are coming in know what their role is gonna be. Know what their, know what. You know, some background is another thing we did. So I started giving you some other tips. What often happens at these is, is they start, you know, throw curves at people. You know, what I mean by that is, you know, kind of like, you can play cricket, but, you know, throw us baseball, you know, curveball.

E-mail me when people leave their comments –

You need to be a member of CISO Platform to add comments!

Join CISO Platform

RSAC Meetup Banner

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)