Fraud Management & Cybercrime , Incident & Breach Response , Managed Detection & Response (MDR)

Incident Response: Why Persistence Is Vital

Attorney Marcus Christian Describes Pitfalls to Avoid
Marcus-Christian, Partner, Mayer Brown

Marcus Christian, a former executive assistant U.S. attorney, implores businesses to not immediately abandon their incident response plans once it appears a suspected incident is resolved.

See Also: Gartner Guide for Digital Forensics and Incident Response

"Sometimes in those instances, it's just that the threat actors, who are very smart and very adaptive, will say, 'OK, they understand that we're there. Let's be quiet.' They will hide in your systems and complete the attack once you shift your focus elsewhere," says Christian, who's now a cybersecurity specialist at a law firm.

In this video interview with Information Security Media Group, Christian discusses:

  • The geopolitical significance of the Kaseya ransomware attack;
  • The likelihood of Russia being willing to collaborate with the U.S to crack down on cybercrime;
  • How organizations can quickly identify and mitigate ransomware attacks and pitfalls to avoid in their incident response preparation.

Christian is a co-leader of the Washington litigation and dispute resolution practice at the law firm Mayer Brown and a partner in its cybersecurity and data privacy practice and white collar defense and compliance group. Before entering private practice, he was the executive assistant U.S. attorney at the U.S. Attorney’s Office for the Southern District of Florida.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.