Discussion of the history of electronic extortion from hit man threats, real vs. copy cat DDoS and ransomware then into using Phishing data for targeted threat intel, varying types of DDoS and readiness, and basic steps for ransomware defense and hardening
Senior Incident Response Consultant for Cisco Advisory Services. Previously the Intrusion Forensics team manager for JPMorgan Chase, and 13 years of law enforcement background with computer crimes.