Autonomous IT, Live! Inside the Breach — Identity Hijack Response Exercise, E04
Autonomous IT17 Heinä 2025

Autonomous IT, Live! Inside the Breach — Identity Hijack Response Exercise, E04

In this special live episode of Autonomous IT, Live! we walk through a high-stakes incident response drill that mimics a disturbingly realistic threat scenario: an attacker gains access to your internal tools — not by breaking in, but by logging in.

Here's the setup: a user unknowingly reuses compromised credentials with the company’s SSO provider. An attacker logs in, flies under the radar, and impersonates internal IT support using Slack, email, and calendar invites. Their goal? Convince employees to install a fake remote access tool—all while avoiding anyone likely to report suspicious behavior.

Join Landon Miles, Tom Bowyer, and Ryan Braunstein as they:

  • 🔍 Investigate a suspicious login and Slack impersonation
  • 🔐 Contain and remediate the breach using real-world tactics and tools
  • 📉 Discuss phishing-resistant MFA, endpoint visibility, Slack impersonation risks, and more
  • 🧠 Share tips on improving security awareness, incident playbooks, and interdepartmental collaboration
  • 💬 Answer live audience questions about malware analysis, EDR response, and building detection rules

Whether you’re a security veteran or just starting out in IT, this episode offers an unfiltered look at how to respond when credentials are compromised and attackers act like insiders.

📎 Bonus: We also include a downloadable Incident Response Checklist to help your team run your own tabletop exercise.

🛡️ Because in today’s world, attackers don’t need to break in—they just need to log in.

Jaksot(206)

Hands-On IT – Virtualization, IT Support, and... Home Labs? How Automox Techies Use Automox, E07

Hands-On IT – Virtualization, IT Support, and... Home Labs? How Automox Techies Use Automox, E07

In this episode of the Hands-On IT podcast, Landon Miles interviews Anthony Maxwell, who is a software engineer at Automox. They discuss Anthony's journey from IT operations to software engineering, a...

28 Loka 202526min

CISO IT –  Dmitri Alperovitch’s Vision for Cyber Defense, E07

CISO IT – Dmitri Alperovitch’s Vision for Cyber Defense, E07

In this episode, host Jason Kikta talks with Dmitri Alperovitch – CrowdStrike co-founder and chairman of the Automox board – about how speed and precision define modern cyber defense. Alperovitch expl...

23 Loka 202522min

Product Talk – Secure by Default: Inside Automox’s Approach to Product Security, E21

Product Talk – Secure by Default: Inside Automox’s Approach to Product Security, E21

In this episode of Product Talk, host Peter Pflaster sits down with Automox Staff Security Engineer Henry Smith to discuss what it really means to be secure by default. Together, they explore how Auto...

21 Loka 202532min

Executive IT – Expert CFO Advice on Bridging IT and Business Strategy, E01

Executive IT – Expert CFO Advice on Bridging IT and Business Strategy, E01

CFOs Ziad Fanous (Automox) and David Mehok (formerly CFO of Q2) join host Evan Kiely to break down how IT transformation drives real business value—not just cost savings. They share candid lessons fro...

16 Loka 202524min

Patch [FIX] Tuesday – October 2025 [Game Engine Gremlins, Windows Hello Attacks, and Exchange Exploits], E24

Patch [FIX] Tuesday – October 2025 [Game Engine Gremlins, Windows Hello Attacks, and Exchange Exploits], E24

Happy Patch Tuesday! In this October episode, security specialists Ryan Braunstein and Mat Lee break down some of the month’s most critical vulnerabilities — and why this batch of CVEs might just be t...

14 Loka 202518min

Automate It – Social Engineering & the Human Risk Factor, E19

Automate It – Social Engineering & the Human Risk Factor, E19

Jeremy Maldonado breaks down cybersecurity fundamentals from a real-world IT operations perspective. From phishing and social engineering to patching best practices and zero trust, Jeremy shares pract...

9 Loka 202514min

Hands-On IT – CVE 101: Demystifying the Three-Letter Acronym, E22

Hands-On IT – CVE 101: Demystifying the Three-Letter Acronym, E22

What is a CVE – and why does it matter to your patching process? Landon Miles breaks down CVEs, CVSS scores, and CNAs – covering how they work together, what to prioritize, and how to respond. Learn h...

7 Loka 20258min

CISO IT – Back to Basics: Three Essentials for Secure IT Operations, E20

CISO IT – Back to Basics: Three Essentials for Secure IT Operations, E20

In this episode, Automox CISO Jason Kikta strips away the noise and focuses on the three core pillars of secure IT operations: asset inventory, patch management, and identity and access management (IA...

2 Loka 20258min

Suosittua kategoriassa Politiikka ja uutiset

aikalisa
rss-ootsa-kuullut-tasta
tervo-halme
ootsa-kuullut-tasta-2
politiikan-puskaradio
rss-podme-livebox
et-sa-noin-voi-sanoo-esittaa
viisupodi
otetaan-yhdet
rss-asiastudio
rss-vaalirankkurit-podcast
the-ulkopolitist
radio-antro
rss-mina-ukkola
io-techin-tekniikkapodcast
linda-maria
rikosmyytit
rss-kaikki-uusiksi
rss-hyvaa-huomenta-bryssel
rss-kuka-mina-olen