Library

Video Player is loading.
 
Current Time 0:00
Duration 8:07
Loaded: 0.00%
 

x1.00


Back

Games & Quizzes

Training Mode - Typing
Fill the gaps to the Lyric - Best method
Training Mode - Picking
Pick the correct word to fill in the gap
Fill In The Blank
Find the missing words in a sentence Requires 5 vocabulary annotations
Vocabulary Match
Match the words to the definitions Requires 10 vocabulary annotations

You may need to watch a part of the video to unlock quizzes

Don't forget to Sign In to save your points

Challenge Accomplished

PERFECT HITS +NaN
HITS +NaN
LONGEST STREAK +NaN
TOTAL +
- //

We couldn't find definitions for the word you were looking for.
Or maybe the current language is not supported

  • 00:04

    Hello, everyone. This is Susan Bradley for CSO Online. Over the weekend, I dealt with
    Hello, everyone. This is Susan Bradley for CSO Online. Over the weekend, I dealt with

  • 00:11

    a misbehaving server that reminded me that no matter how small or how large you are,
    a misbehaving server that reminded me that no matter how small or how large you are,

  • 00:16

    you need to have a security disaster toolkit or a checklist at the ready should any event
    you need to have a security disaster toolkit or a checklist at the ready should any event

  • 00:21

    occur. But as we move away from on premises, servers to cloud servers, perhaps you need
    occur. But as we move away from on premises, servers to cloud servers, perhaps you need

  • 00:27

    to rereview that checklist and see if there's any changes you need to make.
    to rereview that checklist and see if there's any changes you need to make.

  • 00:32

    At a minimum, you need to review your security checklist at least once a year, if not more
    At a minimum, you need to review your security checklist at least once a year, if not more

  • 00:38

    often, and especially if you have any major migrations or big changes or plans in the
    often, and especially if you have any major migrations or big changes or plans in the

  • 00:44

    works.
    works.

  • 00:45

    Now to start NIST, the National Institute of Standards and Technology have several documents
    Now to start NIST, the National Institute of Standards and Technology have several documents

  • 00:51

    online regarding disaster plans and checklists, and it's a way to get started. So if you don't
    online regarding disaster plans and checklists, and it's a way to get started. So if you don't

  • 00:57

    have your own checklists, start here. In addition, the SANS organization has a disaster recovery
    have your own checklists, start here. In addition, the SANS organization has a disaster recovery

  • 01:03

    plan policy and many other policy resources that you can check out on their site. Now,
    plan policy and many other policy resources that you can check out on their site. Now,

  • 01:09

    for many years, the standard operational procedure to deal with a device, especially one that
    for many years, the standard operational procedure to deal with a device, especially one that

  • 01:14

    you thought would be attacked or taken over, was you turned off the device and isolated
    you thought would be attacked or taken over, was you turned off the device and isolated

  • 01:21

    them to ensure that you maintain the log files and evidence. Well, now the standard device
    them to ensure that you maintain the log files and evidence. Well, now the standard device

  • 01:25

    may be it depends depending on where the device is located and what exactly it is. Instead
    may be it depends depending on where the device is located and what exactly it is. Instead

  • 01:32

    of taking the device off line instead, you may flip that device to an isolated network
    of taking the device off line instead, you may flip that device to an isolated network

  • 01:37

    for future investigation. So don't just knee jerk turn off the device. Think about where
    for future investigation. So don't just knee jerk turn off the device. Think about where

  • 01:44

    it is and what ways you have to access. When you're investigating workstations and servers,
    it is and what ways you have to access. When you're investigating workstations and servers,

  • 01:50

    you want to ensure that your processes include backup. The devices are made to ensure the
    you want to ensure that your processes include backup. The devices are made to ensure the

  • 01:56

    system is in its impacted state. Before you restore something and before you put something
    system is in its impacted state. Before you restore something and before you put something

  • 02:03

    back online, make sure you have a capture of it in its impacted state. You want those
    back online, make sure you have a capture of it in its impacted state. You want those

  • 02:08

    actual log files. You want those evidence. And especially in case there's some sort of
    actual log files. You want those evidence. And especially in case there's some sort of

  • 02:14

    FBI investigation you'll need later on. Often in recovery, in the zeal of trying to get
    FBI investigation you'll need later on. Often in recovery, in the zeal of trying to get

  • 02:19

    back online, you don't think of maintaining evidence and you forget what to do. So relax.
    back online, you don't think of maintaining evidence and you forget what to do. So relax.

  • 02:26

    I know that's hard, but slow down. Make sure you have a checklist and do the processes.
    I know that's hard, but slow down. Make sure you have a checklist and do the processes.

  • 02:34

    Now, even before an incident occurs, you may want to have certain things in your toolkit.
    Now, even before an incident occurs, you may want to have certain things in your toolkit.

  • 02:40

    For example, for servers that are in high risk areas, you may want to install or you
    For example, for servers that are in high risk areas, you may want to install or you

  • 02:46

    do want to install Sysmon from Sysinternals. Which once installed on a system, remains
    do want to install Sysmon from Sysinternals. Which once installed on a system, remains

  • 02:52

    resonant across system reboots in order to monitor and log system activity to the windows
    resonant across system reboots in order to monitor and log system activity to the windows

  • 02:57

    log file. The site Github Swift on security has a Sysmon configuration that you want to
    log file. The site Github Swift on security has a Sysmon configuration that you want to

  • 03:04

    check out. And of course, because attackers these days want to do lateral movement inside
    check out. And of course, because attackers these days want to do lateral movement inside

  • 03:11

    an organization. You want to install and use the local administrator password solution
    an organization. You want to install and use the local administrator password solution

  • 03:16

    toolkit. Attackers gain network access through the use of targeted phishing attacks. From
    toolkit. Attackers gain network access through the use of targeted phishing attacks. From

  • 03:24

    there, they'll use a variety means to harvest hashes. And their goal is to get a local administrator
    there, they'll use a variety means to harvest hashes. And their goal is to get a local administrator

  • 03:30

    password. Now, in the old old days, we pick a local master to password it and use it throughout
    password. Now, in the old old days, we pick a local master to password it and use it throughout

  • 03:36

    the network. These days, that's not a good idea, because once an attacker pops one password,
    the network. These days, that's not a good idea, because once an attacker pops one password,

  • 03:42

    they can't get access to the entire network. So again, looking to the local administrator
    they can't get access to the entire network. So again, looking to the local administrator

  • 03:46

    password solution toolkit to solve that issue. The next tool you want to bookmark but not
    password solution toolkit to solve that issue. The next tool you want to bookmark but not

  • 03:54

    download is something called the Microsoft safety scanner. It's a tool that scans and
    download is something called the Microsoft safety scanner. It's a tool that scans and

  • 04:01

    is triggered and is only available for use 10 days after being downloaded. Because obviously
    is triggered and is only available for use 10 days after being downloaded. Because obviously

  • 04:05

    you want the latest signature files included. You'll download it, you'll accept the terms,
    you want the latest signature files included. You'll download it, you'll accept the terms,

  • 04:11

    and you want to install an honor system in order to do a scan to see what's up.
    and you want to install an honor system in order to do a scan to see what's up.

  • 04:18

    You will determine if there is any malicious files on your computer.
    You will determine if there is any malicious files on your computer.

  • 04:23

    The next thing you'll want to make sure you have is what's called a jump bag, and these
    The next thing you'll want to make sure you have is what's called a jump bag, and these

  • 04:28

    things could be personal items or there could be tools. For example, if you'll be traveling
    things could be personal items or there could be tools. For example, if you'll be traveling

  • 04:34

    someplace or going to some location, you may need to have a bag of personal items toothbrush,
    someplace or going to some location, you may need to have a bag of personal items toothbrush,

  • 04:40

    toothpaste, clothes. These days with cloud computing, you'll want to make sure that you
    toothpaste, clothes. These days with cloud computing, you'll want to make sure that you

  • 04:45

    have bookmarked Azure portal links licenses. ISOs of operating systems, the ability to
    have bookmarked Azure portal links licenses. ISOs of operating systems, the ability to

  • 04:52

    have access to needed operating systems to be able to boot back into and restore from
    have access to needed operating systems to be able to boot back into and restore from

  • 04:56

    a backup is key to recovering quickly. So have documentation online as well as off line
    a backup is key to recovering quickly. So have documentation online as well as off line

  • 05:03

    in various paper formats. Yes, old fashioned paper and make sure you have means to access
    in various paper formats. Yes, old fashioned paper and make sure you have means to access

  • 05:08

    such items as your firm's Azure portal, Volue license portal or other access to ISOs and
    such items as your firm's Azure portal, Volue license portal or other access to ISOs and

  • 05:16

    products. You may want to have access to a corporate credit card or some other purchasing
    products. You may want to have access to a corporate credit card or some other purchasing

  • 05:20

    authorization in order to purchase resources and access to services. Think in terms of
    authorization in order to purchase resources and access to services. Think in terms of

  • 05:26

    alternatives to your normal channels of communication. Remember in a disaster, email or other means
    alternatives to your normal channels of communication. Remember in a disaster, email or other means

  • 05:32

    that you normally contact with each other may be off line. So having that jump bag,
    that you normally contact with each other may be off line. So having that jump bag,

  • 05:38

    a list of contact information and alternative ways to contact key from key players, you
    a list of contact information and alternative ways to contact key from key players, you

  • 05:45

    should you'll want to review this on a regular basis. So here's some things you might want
    should you'll want to review this on a regular basis. So here's some things you might want

  • 05:49

    for an on premise situation in a jump bag network cables, USB, cables, hard drives,
    for an on premise situation in a jump bag network cables, USB, cables, hard drives,

  • 05:57

    SSD, external USP drives, flash drives, device interface adapters, a handheld label printer
    SSD, external USP drives, flash drives, device interface adapters, a handheld label printer

  • 06:05

    in order to label drives and things that you're taking out for incident handling hub devices,
    in order to label drives and things that you're taking out for incident handling hub devices,

  • 06:12

    digital cameras, cable ties and cable snips. Screws. Notebooks. Chain of custody forms.
    digital cameras, cable ties and cable snips. Screws. Notebooks. Chain of custody forms.

  • 06:20

    So you document and have a witness of how items were obtained. Incident handling procedures
    So you document and have a witness of how items were obtained. Incident handling procedures

  • 06:27

    and finally, business cards for all members of the team. So that when you go in a situation,
    and finally, business cards for all members of the team. So that when you go in a situation,

  • 06:32

    you could hand out authoritative information about who's on that team. As we go to cloud,
    you could hand out authoritative information about who's on that team. As we go to cloud,

  • 06:40

    we move from to a different set of proper steps in order to do deal with compromised
    we move from to a different set of proper steps in order to do deal with compromised

  • 06:45

    accounts. For example, in Office 365, you'll want to follow the Microsoft recommendations
    accounts. For example, in Office 365, you'll want to follow the Microsoft recommendations

  • 06:51

    and how to secure and restore e-mail function. You want to reset passwords. You want to make
    and how to secure and restore e-mail function. You want to reset passwords. You want to make

  • 06:58

    sure you have multi factor enabled. You want to block the user account from signing in
    sure you have multi factor enabled. You want to block the user account from signing in

  • 07:03

    again, follow the steps here. Then you'll want to go and review the Microsoft security
    again, follow the steps here. Then you'll want to go and review the Microsoft security

  • 07:09

    score and what to do if you haven't already. Take a look at the security roadmap. Look
    score and what to do if you haven't already. Take a look at the security roadmap. Look

  • 07:16

    at the 30 day out steps, the 90 day out steps, the beyond reviewing, constantly reviewing
    at the 30 day out steps, the 90 day out steps, the beyond reviewing, constantly reviewing

  • 07:22

    what threats and risks are coming to cloud security. And finally, you want to review
    what threats and risks are coming to cloud security. And finally, you want to review

  • 07:27

    the Microsoft secure score here in my sample tenant. I have a lousy score. You want to
    the Microsoft secure score here in my sample tenant. I have a lousy score. You want to

  • 07:33

    get that total score higher. You want to be where the attackers go to somebody else. It's
    get that total score higher. You want to be where the attackers go to somebody else. It's

  • 07:39

    easier to attack, not you. So take the time now when you're not in the middle of a disaster
    easier to attack, not you. So take the time now when you're not in the middle of a disaster

  • 07:46

    to plan on having one. Make sure you're ready. Ready for when the event occurs. Not if. And
    to plan on having one. Make sure you're ready. Ready for when the event occurs. Not if. And

  • 07:54

    of course, last but not least. Join us on Tech Talk from IDG, the new YouTube channel
    of course, last but not least. Join us on Tech Talk from IDG, the new YouTube channel

  • 07:59

    for the tech news of the day. Until next time. This is Susan Bradley for CSO Online. See
    for the tech news of the day. Until next time. This is Susan Bradley for CSO Online. See

  • 08:05

    you next time.
    you next time.

All idiom
this is
//

idiom

Used to quote, paraphrase, or mimic the words of someone else, especially in a mocking or derisive manner.

How make a Windows disaster recovery kit

439 views

Video Language:

  • English

Caption Language:

  • English (en)

Accent:

  • English (US)

Speech Time:

98%
  • 8:01 / 8:07

Speech Rate:

  • 155 wpm - Fast

Category:

  • Science & Technology

Intro:

Hello, everyone. This is Susan Bradley for CSO Online. Over the weekend, I dealt with
a misbehaving server that reminded me that no matter how small or how large you are,
you need to have a security disaster toolkit or a checklist at the ready should any event
occur. But as we move away from on premises, servers to cloud servers, perhaps you need
to rereview that checklist and see if there's any changes you need to make.
At a minimum, you need to review your security checklist at least once a year, if not more
often, and especially if you have any major migrations or big changes or plans in the
works.. Now to start NIST, the National Institute of Standards and Technology have several documents
online regarding disaster plans and checklists, and it's a way to get started. So if you don't
have your own checklists, start here. In addition, the SANS organization has a disaster recovery
plan policy and many other policy resources that you can check out on their site. Now,
for many years, the standard operational procedure to deal with a device, especially one that
you thought would be attacked or taken over, was you turned off the device and isolated
them to ensure that you maintain the log files and evidence. Well, now the standard device
may be it depends depending on where the device is located and what exactly it is. Instead
of taking the device off line instead, you may flip that device to an isolated network
for future investigation. So don't just knee jerk turn off the device. Think about where
it is and what ways you have to access. When you're investigating workstations and servers,
you want to ensure that your processes include backup. The devices are made to ensure the

Video Vocabulary

/ˈevədəns/

noun verb

Factual proof that helps to establish the truth. be or show evidence of.

/mānˈtān/

verb

preserve.

/ˌmisbəˈhāv/

verb

of person fail to conduct oneself in acceptable way.

/ˈkapCHər/

noun verb

action of capturing. catch.

/ˈnaSH(ə)n(ə)l/

adjective noun

relating to nation. A person of a particular country.

/pərˈ(h)aps/

adverb

Possibly, but not certainly; maybe.

/ˈsərvər/

noun other

person or thing that serves. People who give food to others at a table.

/mānˈtān/

verb

To keep, exist or continue without changing.

/THôt/

noun verb

Ideas of a particular group. To have an idea, opinion or belief about something.

/mīˈɡrāSH(ə)n/

noun other

seasonal movement of animals from one region to another. Processes of moving to live in another place.

/ˈpräˌses/

noun other verb

series of actions towards achieving something. Sets of changes that occur slowly and naturally. To deal with official forms in the way required.

/dəˈpend/

verb

be controlled or determined by.

/rəˈstôr/

verb

bring back or re-establish.

/prəˈsējər/

noun

A medical operation.

/ˈsəmˌTHiNG/

adverb pronoun

used for emphasis with following adjective functioning as adverb. thing that is unspecified or unknown.