<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Ransomware protect and architecture in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Ransomware-protect-and-architecture/m-p/39467#M99</link>
    <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone used or developed their own architecture to combat Ransomware are per this NIST three part piece, with Demonstration Video and a leaflet too? &amp;nbsp; - quite a collaboration.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;This is surprisingly timely lol. We're currently going over our BC plan documents with the intent of making them better. Some of the questions this brought to mind was:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do we know at what settings level (system requirements?) our systems need to be at before when can start restoring them from our current backup provider?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does our backup provider have anything published with the minimum system requirements needed to perform the different recovery types?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so, did anything change with the current Knowledge Base article published by the backup provider?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 23 Sep 2020 15:55:39 GMT</pubDate>
    <dc:creator>tmekelburg1</dc:creator>
    <dc:date>2020-09-23T15:55:39Z</dc:date>
    <item>
      <title>Ransomware protect and architecture</title>
      <link>https://community.isc2.org/t5/Threats/Ransomware-protect-and-architecture/m-p/39461#M98</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone used or developed their own architecture to combat Ransomware are per this NIST three part piece, with Demonstration Video and a leaflet too? &amp;nbsp; - quite a collaboration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;&lt;A href="https://lnkd.in/gpAsrzX" target="_blank" rel="noopener"&gt;https://www.nccoe.nist.gov/projects/building-blocks/data-integrity/recoverhttps://lnkd.in/gpAsrzX&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;Videos at &lt;A href="https://www.nccoe.nist.gov/library/data-integrity-ransomware-and-recovery-demo-videos" target="_blank"&gt;https://lnkd.in/gdQ8Ykd&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN class="break-words"&gt;&lt;SPAN&gt;2 page factsheet on scenarios, architecture and technology partners is at &lt;A href="https://www.nccoe.nist.gov/sites/default/files/library/fact-sheets/data-integrity-fact-sheet.pdf" target="_blank"&gt;https://www.nccoe.nist.gov/sites/default/files/library/fact-sheets/data-integrity-fact-sheet.pdf&lt;/A&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:38:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Ransomware-protect-and-architecture/m-p/39461#M98</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:38:48Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware protect and architecture</title>
      <link>https://community.isc2.org/t5/Threats/Ransomware-protect-and-architecture/m-p/39467#M99</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Has anyone used or developed their own architecture to combat Ransomware are per this NIST three part piece, with Demonstration Video and a leaflet too? &amp;nbsp; - quite a collaboration.&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;This is surprisingly timely lol. We're currently going over our BC plan documents with the intent of making them better. Some of the questions this brought to mind was:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Do we know at what settings level (system requirements?) our systems need to be at before when can start restoring them from our current backup provider?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Does our backup provider have anything published with the minimum system requirements needed to perform the different recovery types?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If so, did anything change with the current Knowledge Base article published by the backup provider?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 23 Sep 2020 15:55:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Ransomware-protect-and-architecture/m-p/39467#M99</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-09-23T15:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Ransomware protect and architecture</title>
      <link>https://community.isc2.org/t5/Threats/Ransomware-protect-and-architecture/m-p/39543#M100</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/690706113"&gt;@tmekelburg1&lt;/a&gt;Can I suggest you also read this article as well?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/posts/zero-trust-defend-ransomware-attacks/?utm_medium=OSocial&amp;amp;utm_source=Twitter&amp;amp;utm_content=000000NJ&amp;amp;utm_term=10013747&amp;amp;utm_id=ZT-Ransomware&amp;amp;cm_mmc=OSocial_Twitter-_-Security_Optimize+the+Security+Program-_-WW_WW-_-ZT-Ransomware&amp;amp;cm_mmca1=000000NJ&amp;amp;cm_mmca2=10013747&amp;amp;social_post=3756373114&amp;amp;linkId=100489802" target="_blank"&gt;https://securityintelligence.com/posts/zero-trust-defend-ransomware-attacks/?utm_medium=OSocial&amp;amp;utm_source=Twitter&amp;amp;utm_content=000000NJ&amp;amp;utm_term=10013747&amp;amp;utm_id=ZT-Ransomware&amp;amp;cm_mmc=OSocial_Twitter-_-Security_Optimize+the+Security+Program-_-WW_WW-_-ZT-Ransomware&amp;amp;cm_mmca1=000000NJ&amp;amp;cm_mmca2=10013747&amp;amp;social_post=3756373114&amp;amp;linkId=100489802&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Would this also leave an impression on how tackle the problem as well within your BCP?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_cautim&lt;/P&gt;</description>
      <pubDate>Sun, 27 Sep 2020 20:58:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Ransomware-protect-and-architecture/m-p/39543#M100</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2020-09-27T20:58:52Z</dc:date>
    </item>
  </channel>
</rss>

