Incident Response with Empathy

Published: Oct. 11, 2023, 7:10 a.m.

On this week's episode of The Microsoft Threat Intelligence Podcast, Sherrod DeGrippo is joined by Matthew Zorich, a Principal Consultant with Microsoft Incident Response. Sherrod and Matt discuss his motivation for creating accessible and open-source forensics tools and resources for entry-level forensics, aiming to guide those without extensive resources. They also examine the importance of helping smaller businesses and individuals understand and practice incident response and forensics, considering the potentially devastating impact of cyberattacks on them. Matt also emphasizes the importance of knowledge sharing and practical experimentation in incident response and identity forensics to help individuals and organizations better defend against cyber threats.\xa0\n\xa0\xa0\xa0\nIn this episode you\u2019ll learn:\xa0\xa0\xa0\xa0\xa0\xa0\n\nThe challenges of identity-based forensics\xa0\n\nTactics threat actors use to compromise accounts without raising suspicion\xa0\n\nThe importance of distinguishing personal and work identities when assessing threats\xa0\n\n\xa0\xa0\nSome questions we ask:\xa0\xa0\xa0\xa0\xa0\n\nWhy is it important to distinguish personal and work email from a threat perspective?\xa0\n\nHow do you protect essential accounts in a large organization?\xa0\n\nWould you consider text messages as a reliable method to enhance security?\xa0\xa0\n\n\xa0\nResources:\xa0\xa0\nView Matthew Zorich on LinkedIn\xa0\xa0\nView Sherrod DeGrippo on LinkedIn\xa0\xa0\n\xa0\n\nRelated Microsoft Podcasts:\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\xa0\n\nAfternoon Cyber Tea with Ann Johnson\n\nThe BlueHat Podcast\n\n\nUncovering Hidden Risks\xa0\xa0\xa0\n\n\xa0\xa0\xa0\xa0\xa0\xa0\nDiscover and follow other Microsoft podcasts at microsoft.com/podcasts\xa0\nGet the latest threat intelligence insights and guidance at Microsoft Security Insider\n\nThe Microsoft Threat Intelligence Podcast is produced by Microsoft and distributed as part of The CyberWire Network.