General
General Pt 2
Resilience
Observabilty
Remediation
100

We have an infrastructure security solution, so we are protected... 

End with a TEDW question

-You still need Infrastructure Security

-Fundamentally different from Data Security

-Have to have both to survive ransomware

100

What is TEDW? What's the purpose?

“Talk me through.../Tell me…”

“Explain…”

“Describe…”

“Walk me through…”

Encourages dialogue and expression-- an incredibly powerful tool to build an understanding of the other person's position


100

What is data resilience in terms of Rubrik?

Secure your data from insider threats or ransomware with air-gapped, immutable, access-controlled backups

-Immutable

-Retention Lock

-MFA, TOTP, RBAC, NTP

-Logical Airgap


100

What is data observability in terms of Rubrik?

Continuously monitor your data for ransomware, remediate sensitive data exposure, and find indicators of compromise

-Ransomware Investigation- Blast Radius

-Sensitive Data Discovery

-Threat Hunting

100

What is data remediation in terms of Rubrik?

Surgically and rapidly recover your apps, files or users, while avoiding
malware reinfection

-Mass recovery

-Orchestrated app recovery

-Threat Containment 


200

I'm in IT Ops, it is IT Security's job to investigate a ransomware attack...

End with a TEDW question

-Typically, we see both IT ops team and their Sec Ops team are engaged in the event of a ransomware attack


200

What is Rubrik? 

End with a TEDW question

- Data Security

- Resilience, Observability, & Remediation

- cyber-proof your backups

- continuously monitor your data

-ensure safe and quick recovery

200

What are some specific Rubrik features that ensures data resilience?

End TEDW

  • Immutable

  • Retention Lock

  • MFA, TOTP, RBAC, NTP

  • Logical Airgap

200

I would know if malware got into my environment... End with a TEDW question

- malware can sit dormant in an environment

- blast radius

200

I already have backups to recover from... (Reinfection) End with a TEDW question

- targeting backups

-clean copy

- recovery point

300

I thought M365 was protected by Microsoft... 

End with a TEDW question

-M365 is a tier 1 app that’s being attacked

-MSFT suggests 3rd party protection

-Core operational problem - granular or scale recovery

-Cyber risk problem - admin credentials are compromised


300

Isn't Rubrik just backup? We already have a backup solution...

End with a TEDW question

Business built on backup / recovery - best way to get access to all data

Always having a “Security First” mindset & architectural principles

 Langs

300

I already have backups to recover from...  End with a TEDW question

- backup data is compromised

- discover any data anomalies/what applications are impacted

- recover critical applications in a timely manner


300

I know where my sensitive data lives... End with a TEDW question

- Classification can be manual

- Avoid double extortion = knowing  sensitive data exposure (get house in order today)

300

I already have backups to recover from... (Complexity recovery process) End with a TEDW question

- time spent on answering the questions

-Clean recovery environment

- Automate app-level recovery 

- Testable plan


400

I'm in IT Security, if we have to recover from an attack, that is IT Ops' job... 

End with a TEDW question

-Typically, we see both IT ops team and their Sec Ops team are engaged in the event of a ransomware attack

400

We were already hit a few years ago, we've addressed our vulnerabilities...

End with a TEDW question

80% of ransomware victims suffer repeat attacks

400

Our backups are immutable... 

End with a TEDW question

- turn feature on/ turn feature off

400

I would be able to identify what was infected...

End with a TEDW question

- time spent on discovering scope of the attack 

400

I have a list of mission critical apps written down... End with a TEDW question

  • average downtime cost totaled $283,000

  • Automate app-level recovery

  • Testable plan

500

If we get attacked, we will probably just pay the ransom (direct vs indirect costs)...

End with a TED-W

Direct: Downtime, ransom payment

Indirect:lost productivity, damaged reputation, customer churn, legal fees, non-compliance fines, penalties, and restitution  

500

If we get attacked, we will probably just pay the ransom to get our data back(complexity even after paying the ransom)...

End with a TED-W

- Decrypter key doesn't work 

- double extortion

500

Tell me a customer story (data resilience)... End with a TEDW question

ex.

- WED2B

two recoveries taking place: one for data managed by Rubrik and one for Azure

backups. data on Rubrik was back up and running within 24 hours, it took weeks upon weeks to get NAS back up and running since it was not protected by Rubrik

500

Tell me a customer story (data observability)...End with a TEDW question

Ex.

Langs

500

Tell me a customer story (data remediation)... End with a TEDW question

Langs

M
e
n
u