The Ring of Defense

In this episode, Bill Carter discusses the 'recipe of ransomware' and discusses how the business of ransomware actually works, aligned with the 6-E's:
Establishing - setting up the framework
Embedding - gaining access and foothold
Evading - ensuring that all monitoring tools are blind to activity
Encrypting - hiding the data from the data owner/custodian
Exfiltrating - removing the data for malicious usage
Extorting - making bank, baby!

What is The Ring of Defense?

Join Robin Johns, and Bill Carter as we delve into the intricate world of cybersecurity, exploring the critical issues, fundamental concepts, and the latest security incidents that shape our digital landscape.

In each episode, Robin and Bill bring their wealth of knowledge and experience to the forefront, unraveling complex cybersecurity topics and making them accessible to all listeners. Whether you're a seasoned professional, an aspiring cybersecurity enthusiast, or simply someone interested in safeguarding your digital presence, this podcast offers valuable insights and practical advice.