POPULARITY
A chemical manufacturing company grinds to a halt when a cyberattack locks up their entire assembly line. Kurtis Minder, a renowned ransomware negotiator, answers their call for help and explains why manufacturing companies are uniquely vulnerable to these kinds of disruptive attacks. Then David Adrian from Chrome chats with Kate about how a web-focused strategy can help manufacturers transform what are commonly thought of as massive vulnerabilities into secured points of access and visibility. This episode is sponsored by Chrome Enterprise.See omnystudio.com/listener for privacy information.
Play Episode Play 91 sec Highlight Play 133 sec Highlight Play 60 sec Highlight Play 258 sec Highlight Play 129 sec Highlight Listen Later
Steve speaks with Kurtis Minder, Co-Founder and CEO of GroupSense, about his experiences as a ransomware negotiator, the importance of cyber hygiene, ransomware's impact on brand and employee perceptions, AI use cases for both attack and defense, preparing for the arrival of quantum computing, the evolution of cyber warfare and more.
Cyber hygiene, CMMC, and ransomware – oh my! – we unpack the state of the current cyber threat landscape with Kurtis Minder, CEO and founder of GroupSense, a digital risk protection agency with expertise across a variety of digital risk arenas. A variety of factors contributed to the steep rise in ransomware attacks across the past several years, including the growth in cryptocurrency and a global pandemic creating more lax security procedures for many moving to home networks. Minder discussed how threat actors are expanding their reach into the government's supply chain, what companies and agencies can do to make themselves less vulnerable, and how to address the current shortage in cybersecurity talent. Hosted on Acast. See acast.com/privacy for more information.
Kurtis Minder, CEO of GroupSense joins Dave to discuss how ransomware new laws leave small business behind. Dave and Joe share some follow up on Elon Musk after his big purchase and the changes that now follow. Joe's story follows Kalamazoo County residents and a new scam that is popping up, where they are being targeted by scammers through Facebook messenger video calls. Dave shares a story that hits home for him about an email that his father received from Best Buy claiming that he will be charged $500 for Geek Squad services. Our catch of the day comes from an anonymous listener who writes in to share an email they received from a Mrs. Phong Dung, who wants to send 1 million to the person who received the email. The receiver knows this email is a fake and writes into the show to ask Joe and Dave if these emails ever actually work on anyone. Links to stories: Kalamazoo County residents targeted in Facebook messenger video call scam Have a Catch of the Day you'd like to share? Email it to us at hackinghumans@thecyberwire.com or hit us up on Twitter.
Ransomware can send any company into crisis. Immediately following an attack, the notoriously disruptive malware can spread across networks and machines, locking up important files and rendering vital data almost useless for all employees. As we learned in a previous episode of Lock and Code, a ransomware attack not only threatens an organization's clients and external customers, but all the internal teams who are just trying to do their jobs. When Northshore School District was hit several years ago by ransomware, teacher and staff pay were threatened, and children's school lunches needed to be reworked because the payment system had been wiped out. These threats are not new. If anything, the potential damage and fallout of a ransomware attack is more publicly known than ever before, which might explain why a new form of ransomware response has emerged in the past year—the ransomware negotiator. Increasingly, companies are seeking the help of ransomware negotiators to handle their response to a ransomware attack. The negotiator, or negotiators, can work closely with a company's executives, security staff, legal department, and press handlers to accurately and firmly represent the company's needs during a ransomware attack. Does the company refuse to pay the ransom because of policy? The ransomware negotiator can help communicate that. Is the company open to paying, but not the full amount demanded? The negotiator can help there, too. What if the company wants to delay the attackers, hoping to gain some much-needed time to rebuild systems? The negotiator will help there, too. Today, on the Lock and Code podcast with host David Ruiz, we speak with Kurtis Minder, CEO of the cyber reconnaissance company GroupSense about the intricate work of ransomware negotiation. Minder himself has helped clients with ransomware negotiation and his company has worked to formalize ransomware negotiation training. In his experience, Minder has also learned that the current debate over whether companies should pay the ransom has too few options. For a lot of small and medium-sized businesses, the question isn't an ideological one, but an existential one: Pay the ransom or go out of business. "What you don't hear about is the thousands and thousands of small businesses in middle America, main street America—they get hit... they're either going to pay a ransom or they're going to go out of business." Tune in today to listen to Minder discuss how a company decides to engage a ransomware negotiator, what a ransomware negotiator's experience and background consist of, and what the actual work of ransomware negotiation involves. Show notes and credits: Intro Music: “Spellbound” by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 4.0 License http://creativecommons.org/licenses/by/4.0/ Outro Music: “Good God” by Wowa (unminus.com)
Your organization was hit by ransomware, and it is now time to reach out to the hackers and negotiate the terms of a deal that will bring back your data, and (hopefully) won't leave the company's coffers empty. But before you sit down in front of your computer and fire off a message to the hackers - stop. Are you sure that you know what you're doing? Are you certain that you won't screw up the negotiations and do more harm than good?
Kurtis Minder: Ransomware Negotiations [ML BSide]Advertising Inquiries: https://redcircle.com/brands
In this episode your host, David Weaver, talks with entrepreneur Kurtis Minder, CEO of GroupSense. GroupSense is a Cyber Reconnaissance Company that delivers customer-specific intelligence with a mission to eliminate unexpected cyber threats & risk from their client's businesses by utilizing the best intelligence sourcing on the market. During this episode Kurtis & David discuss Kurtis's journey in entrepreneurship, how & why he got into the work he is doing, along with how his Company's culture, values & leadership shaped who he is today. To learn more about Chris's work & offering: https://www.groupsense.io/company If you'd like to be a guest on Sacrifice to Success, click HERE: https://lnkd.in/dUj-4bEV To learn more about how I serve business owners, visit: davidweavercoach.com
Cyber Security Matters, hosted by Dominic Vogel and Christian Redshaw
Kurtis Minder is today's guest on the Cyber Security Matters podcast, hosted by Dominic Vogel and Christian Redshaw. Founder & CEO of GroupSense, a digital risk protection services company that delivers customer-specific intelligence that dramatically improves enterprise cyber security and fraud-management operations. Kurtis Minder has over 20 years of information security experience spanning operations, design and business development. In this episode, we will discuss: -How cyber security threat intelligence impacts organizations -Why there has been an increase in ransomware attacks -How ransomware negotiation works -What factors companies need to consider when they get hit by ransomware Want to connect with Kurtis? Here are a couple of ways that you can do exactly that: -Website: www.groupsense.io -LinkedIn: @KurtisMinder
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
The Chief Executive Officer and Co-Founder of GroupSense, Mr. Kurtis Minder joins Co-Host Andy Bonillo on Episode #209 of Task Force 7 Radio to talk about how he became a Ransomware Negotiator, lessons learned from those negotiations, and how empathy has helped him in those negotiations. He talked about the importance of running a business that starts with focusing on customer desired outcomes and how small businesses need cyber security resources. We finished the show discussing how cyber criminals may be shifting their focus during the Russia/Ukraine conflict. All this and much more on Episode #209 of Task Force 7 Radio.
In this episode of Cybercrime Radio, host Hillarie McClure speaks with Kurtis Minder, a ransomware negotiator and CEO of GroupSense, a leading provider in Cyber Reconnaissance. Kurtis shares with us the landscape of ransomware negotiation, the best practices he's found since falling into this role, how empathy is at the root of every communication he has, and more. For more on cybersecurity, visit us at https://cybersecurityventures.com
On Today's Podcast: Homecoming Memories Ruined, Cyber Security, and Trashball. Kurtis Minder, CEO of GroupSense, Joined the Podcast.
Coolness is an aesthetic of attitude, behavior, comportment, appearance and style which is generally admired. Because of the varied and changing connotations of cool, as well as its subjective nature, the word has no single meaning. It has associations of composure and self-control and often is used as an expression of admiration or approval. Although commonly regarded as slang, it is widely used among disparate social groups and has endured in usage for generations. -- Wikipedia On today's No Name Security Podcast, Matt Stephenson welcomes 3 people doing very cool things in a very cool industry… and… they happen to be to very cool people. Kurtis Minder is the co-founder and CEO at GroupSense, Tom Pace is the co-founder and CEO at NetRise and Scott Scheferman is the Chief Strategist at Eclypsium. They are each legendary incident response types who were at Black Hat for a multitude of reasons. Why were they there…? Stick around and find out! About Kurtis Minder Kurtis Minder (@kurtisminder) is the founder of GroupSense, a threat intelligence company. He leads a team of analysts and technologists providing custom cybersecurity intelligence to brands around the globe. The company's analysts conduct cyber research and reconnaissance and map the threats to client risk profiles. He arrived at GroupSense after more than 20 years in role-spanning operations, design and business development at companies such as Mirage Networks (acquired by Trustwave), Caymas Systems (acquired by Citrix) and Fortinet (IPO). About Tom Pace Tom Pace (@TommyPastry) is the co-founder and CEO of NetRise, an automated, cloud-based platform that provides comprehensive insight into the risks present in a firmware image. Prior to founding NetRise, Tom spent 16 years working in security across multiple roles and disciplines. From serving in the United States Marine Corps, being responsible for ICS security within the Department of Energy and most recently serving as Global Vice President for Cylance, he has been a leader and innovator within cybersecurity. Tom has also responded to hundreds of security incidents globally and shared his experience at multiple security conferences such as RSA and Black Hat. About Scott Scheferman Scott Scheferman (@transhackerism) is the founder of Armanda Intelligence, LLC, with a mission of providing CxO/board advisement, strategy and threat intelligence. He is also Principal Strategist for Eclypsium, Inc. Scott keeps a hyper-current beat on the threat landscape and how it continues to fundamentally change business and mission cyber risk dynamics. Battle-hardened from years of red-teaming, incident response and cyber consulting, as well as having served as the technical lead and final security risk determination for the Navy's Certification Authority (thousands of systems per year, with over 800 validators and 30 risk analysts feeding these risk determinations), Scott draws his perspective from significant real-world high-stakes (multi-billion dollar programs and Fortune 10 enterprise) experience. If you want the truth about what is happening in the world of cybersecurity, Scott is a voice you want to be listening to. If you can't handle the truth… he may not be your guy… but that doesn't mean he won't keep telling it. About Matt Stephenson Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well. In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know... Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy. Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round... If you tuned in to any of my previous podcasts, there's great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We're still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Kurtis is the founder and CEO of GroupSense and has successfully raised the company from the ground up. GroupSense offers digital risk protection from threats across all environments, and Kurtis himself has over 20 years of information security experience spanning operations, design, and business development. Kurtis is a disciplined and focused leader who has guided the company in developing an innovative approach to cyber intelligence.Kurtis joins Dominique Shelton Leipzig and David Biderman on the Decrypted Unscripted podcast to discuss how GroupSense's team of cyberspies knows how to find where the bad guys are operating and work with clients to protect their data. He describes the dark web and how it helps criminals steal information and shares why his team has seen a steady increase in threat actors accessing data remotely over the last 12 months.
21:47 no Nothing good, now that the ransomware gang's servers have vanished mid-negotiation, as ransomware negotiator Kurtis Minder details on Threatpost podcast. Nothing good, now that the ransomware gang's servers have vanished mid-negotiation, as ransomware negotiator Kurtis Minder details on Threatpost podcast. GroupSense's Minder offers tips on
A Chinese APT is active against targets in Myanmar and, especially, the Philippines. Cyberespionage campaigns suggest that there's a thriving market for zero-days. MI5 warns against spying, disinformation, and radicalization. REvil continues to lie low (and the Kremlin hasn't seen anything). CISA offers ransomware mitigation advice. Bogus Coinbase sites steal credentials. Ransomware attacks on old SonicWall products expected. Daniel Prince from Lancaster University looks at Getting into the industry, and whether a degree is worth it. Our guest is Kurtis Minder from GroupSense, tracking 3 divergent ransomware trends. And Rewards for Justice offers a million dollars for tips on cyberattacks. For links to all of today's stories check out our CyberWire daily news briefing: https://www.thecyberwire.com/newsletters/daily-briefing/10/135
“The bad guys know they are bad guys—they are trying to pretend to be businesspeople… as long as you pretend with them that this is just a normal business transaction, it goes better.” -- Kurtis Minder; Fortune, 01 June 2021 If you have been reading about or watching news shows discussing ransomware, more than likely, you have seen Kurtis Minder. He has been nearly omnipresent across multiple platforms because his team at Groupsense has been putting in the work to help the victims of ransomware attacks negotiate with attackers in order to get their data back. Here's the best part… we're not talking about that. Not that it's not important, but there is a lot more that Kurtis and his team have been up to. Kurtis has brought the knowledge on that specific topic to television, podcasts and many other mediums in order to spread the word. He has a lot more to say about the state of cybersecurity. That is what we are here to talk about. Okay… we do talk about ransomware negotiation a bit, BUT… we dig deep into so much more. Matt Stephenson welcomes Groupsense CEO and co-founder Kurtis Minder for a discussion about the Seven Dirty Words of Cybersecurity. Depending on your definition of a Dirty Word, this may be a cautionary or inspirational tale. Either way, Kurtis and his team are busting their asses to help secure the data, prevent attacks and… in the worst case scenario… help victims get their data back so they can continue to do their work. And he may be doing it while riding cross country on a motorcycle… About Kurtis Minder Kurtis Minder (@kurtisminder) is the founder of GroupSense, a threat intelligence company. He leads a team of analysts and technologists providing custom cybersecurity intelligence to brands around the globe. The company's analysts conduct cyber research and reconnaissance and map the threats to client risk profiles. He arrived at GroupSense after more than 20 years in role-spanning operations, design and business development at companies such as Mirage Networks (acquired by Trustwave), Caymas Systems (acquired by Citrix) and Fortinet (IPO). About Matt Stephenson Matt Stephenson (@packmatt73) leads the Social Media team at Forescout, which puts me in front of people all over the world. Prior to joining Forescout, I hosted podcasts, videos and live events all over the world which put me with experts on every corner of the cybersecurity landscape. The new No Name Security Podcast will continue and expand upon that tradition as we seak out the leading minds in the security industry as well as those may break things every now again. And… just for fun, there will be some wildcard guests as well. In 10 years in the ecosystem of Data Protection and Cybersecurity I have toured the world extolling the virtues of Artificial Intelligence and Machine Learning and how, when applied to information security, these technologies can wrong-foot the bad guys. Prior to the COVID shutdown, I was on the road over 100 days a year doing live malware demonstrations for audiences from San Diego to DC to London to Abu Dhabi to Singapore to Sydney. One of the funniest things I've ever been a part of was blowing up a live instance of NotPetya 6 hours after the news broke... in Washington DC... directly across the street from FBI HQ... as soon as we activated it a parade of police cars with sirens blaring roared past the building we were in. I'm pretty sure they weren't there for us, but you never know... Whether at in person events, live virtual events or podcasting, I get to interview interesting people doing interesting things all over the world of cybersecurity and the extended world of hacking. Sometimes, that means hacking elections or the coffee supply chain... other times that means social manipulation or the sovereign wealth fund of a national economy. Wherever I go, my job is all about talking with the people who build, manage or wreck the systems that we have put in place to make the world go round... If you tuned in to any of my previous podcasts, there's great news! The No Name Security Podcast is here! I will be bringing the same kind of energy and array of guests you know and love. Best part? We're still at the same spot. You can find it at Spotify, Apple, Amazon Music & Audible as well as, GooglePlay, Gaana, Himalaya, I Heart Radio and wherever you get your podcasts! Make sure you Subscribe, Rate and Review!
Eexiled Belarusian opposition leader Svetlana Tikhanovskaya joins Bianna Golodryga, standing in for Christiane Amanpour, to assess what democratic countries must do to put pressure on President Lukashenko. As President Biden arrives in the UK for the G7 meeting of leading economies, Chris Krebs, partner at Krebs Stamos Group and a former DHS cybersecurity official, discusses why we're seeing more ransomware attacks with and why dealing with this is a key priority for America. Kurtis Minder, CEO of cyber reconnaissance company GroupSense and ransomware negotiator, explains that many hacking victims have no choice but to pay ransoms, despite government guidance. And our Walter Isaacson speaks to Dr Patrick Soon Shiong, chairman of both the LA Times and ImmunityBio, about the new form of COVID vaccine he's developing which is current in trials in U.S. and his native South Africa. To learn more about how CNN protects listener privacy, visit cnn.com/privacy
Hackers are making millions from ransomware attacks. What can be done to stop them? Ed Butler speaks to professional ransomware negotiator Kurtis Minder, about the increasing professionalisation of the ransomware business. Kimberly Grauer, head of research at Chainalysis explains why following the bitcoin trail may be the best way of bringing ransomware gangs to justice and Vishaal Hariprasad, boss of cyber insurance company Resilience, tells us why the ransomware threat means there needs to be a stepchange in how companies view cyber security. (Photo: Illustration of ransomware attack, Credit: Getty Images)
The U.S. government says it's taking ransomware attacks as seriously as terrorism after meat plants and a major U.S. pipeline network were temporarily shuttered by hackers. But will that make it any easier to catch the perpetrators? Joe Uchill, a senior reporter with online cybersecurity publication SC Media, brings us the view from Washington. We also speak with Kurtis Minder, founder and CEO of GroupSense, which helps organizations defend against cyber threats; and David Shipley, co-founder and CEO of Fredericton-based cybersecurity startup Beauceron Security.
Ransomware attacks that lock up a victim's systems have become more common. So have people who negotiate with the hackers on behalf of the victims. Kurtis Minder, co-founder of the cyber reconnaissance startup GroupSense, discusses what those negotiations are like, and cybersecurity reporter David Uberti discusses how this approach is viewed within the cyber community. Christopher Zinsli hosts. Learn more about your ad choices. Visit megaphone.fm/adchoices
Ever thought of hiring a ransomware negotiator, or becoming one yourself? On today's episode, Kurtis Minder of GroupSense tells us what makes a good ransomware negotiator, why setting the right tone is crucial in a successful negotiation and why, in the right situation, you can get away with referring to a ransomer as “grasshopper.” We're also excited to announce a new, hands-on training series called Cyber Work Applied. Every week, expert Infosec instructors and industry practitioners teach you a new cybersecurity skill and show you how that skill applies to real-world scenarios. You'll learn how to carry out different cyberattacks, practice using common cybersecurity tools, follow along with walkthroughs of how major breaches occurred, and more. And it's free! Check out the link below to start learning.– Learn cybersecurity with our FREE Cyber Work Applied training series: https://www.infosecinstitute.com/learn/ – View Cyber Work Podcast transcripts and additional episodes: https://www.infosecinstitute.com/podcastAs the CEO and co-founder of GroupSense, Kurtis Minder leads a team of world-class analysts and technologists providing custom cybersecurity intelligence to some of the globe's top brands. The company's analysts conduct cyber research and reconnaissance and map the threats to client risk profiles. Kurtis arrived at GroupSense after more than 20 years in roles spanning operations, design and business development at companies like Mirage Networks (acquired by Trustwave), Caymas Systems (acquired by Citrix) and Fortinet (IPO).About InfosecInfosec believes knowledge is power when fighting cybercrime. We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and privacy training to stay cyber-safe at work and home. It's our mission to equip all organizations and individuals with the know-how and confidence to outsmart cybercrime. Learn more at infosecinstitute.com.
Kurtis Minder: Ransomware Negotiations [ML BSide]Advertising Inquiries: https://redcircle.com/brands