Go offline with the Player FM app!
CCT 308: Scripted Sparrow BEC and CISSP Incident Response - Domain 7.6
Manage episode 525603496 series 3464644
A single convincing email can move real money. We break down how Scripted Sparrow and other BEC crews spoof reply chains, impersonate trusted service providers, and slip under approval thresholds to nudge finance teams into wiring funds. The threat isn’t flashy malware; it’s pressure, process gaps, and the illusion of internal approval. We talk through the red flags that matter, from sudden vendor banking changes to realistic W9 attachments and urgent payment timelines, and then lay out the safeguards that stop these scams cold.
From there, we zoom out to the full incident management lifecycle and make it practical. You’ll hear how we define an incident by its impact on confidentiality, integrity, and availability, and why that clarity speeds action. We map the steps—detection, response, mitigation, reporting, recovery, remediation, and lessons learned—and explain what they look like in a real company: one-click phishing reporting for employees, prepared legal statements for regulators, isolation choices that protect revenue, and documentation habits that pay off when auditors and insurers start asking questions.
We also get honest about today’s attack surface. Cloud sharing, APIs, and over-permissive identities push sensitive data to the edge, making containment harder if an attacker lands. Expect persistence: backdoors, credential reuse, and lateral movement thrive when local admin rights and flat networks remain. The antidote is a blend of stronger finance workflows, pre-briefed legal and communications teams, and regular tabletop drills that involve everyone who touches money, systems, or messaging.
If you’re serious about preventing wire fraud and surviving security incidents with your business intact, this conversation gives you a focused plan you can adopt today. Subscribe, share with your finance and HR leaders, and leave a review with the one control you’ll implement first.
Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.
Join now and start your journey toward CISSP mastery today!
Chapters
1. Holiday Hello And Setup (00:00:00)
2. Today’s Focus: Incident Management (00:01:17)
3. Scripted Sparrow BEC Threat Overview (00:01:37)
4. Why Finance And AP Get Targeted (00:03:05)
5. W9s, Thresholds, And Urgency Tactics (00:05:17)
6. Training Finance And Out-Of-Band Checks (00:07:25)
7. Promo: CISSP Cyber Training Resources (00:10:43)
8. Defining An Incident And CIA Impact (00:12:17)
9. IR Steps: Detect, Respond, Mitigate, Report (00:16:05)
10. Small Signals, Big Ransomware Fires (00:20:37)
11. Detection Tools And User Reporting (00:23:05)
12. Process Discipline And Avoiding Ghost Chases (00:27:04)
13. Low And Slow Attackers And Third Parties (00:30:20)
14. Response Playbooks And Prepped Legal Teams (00:33:25)
15. Retainers, CSIRTs, And Evidence Handling (00:36:52)
16. Reporting, Regulators, And Public Affairs (00:41:04)
17. Recovery First, Then Documentation (00:45:12)
311 episodes
Manage episode 525603496 series 3464644
A single convincing email can move real money. We break down how Scripted Sparrow and other BEC crews spoof reply chains, impersonate trusted service providers, and slip under approval thresholds to nudge finance teams into wiring funds. The threat isn’t flashy malware; it’s pressure, process gaps, and the illusion of internal approval. We talk through the red flags that matter, from sudden vendor banking changes to realistic W9 attachments and urgent payment timelines, and then lay out the safeguards that stop these scams cold.
From there, we zoom out to the full incident management lifecycle and make it practical. You’ll hear how we define an incident by its impact on confidentiality, integrity, and availability, and why that clarity speeds action. We map the steps—detection, response, mitigation, reporting, recovery, remediation, and lessons learned—and explain what they look like in a real company: one-click phishing reporting for employees, prepared legal statements for regulators, isolation choices that protect revenue, and documentation habits that pay off when auditors and insurers start asking questions.
We also get honest about today’s attack surface. Cloud sharing, APIs, and over-permissive identities push sensitive data to the edge, making containment harder if an attacker lands. Expect persistence: backdoors, credential reuse, and lateral movement thrive when local admin rights and flat networks remain. The antidote is a blend of stronger finance workflows, pre-briefed legal and communications teams, and regular tabletop drills that involve everyone who touches money, systems, or messaging.
If you’re serious about preventing wire fraud and surviving security incidents with your business intact, this conversation gives you a focused plan you can adopt today. Subscribe, share with your finance and HR leaders, and leave a review with the one control you’ll implement first.
Gain exclusive access to 360 FREE CISSP Practice Questions at FreeCISSPQuestions.com and have them delivered directly to your inbox! Don’t miss this valuable opportunity to strengthen your CISSP exam preparation and boost your chances of certification success.
Join now and start your journey toward CISSP mastery today!
Chapters
1. Holiday Hello And Setup (00:00:00)
2. Today’s Focus: Incident Management (00:01:17)
3. Scripted Sparrow BEC Threat Overview (00:01:37)
4. Why Finance And AP Get Targeted (00:03:05)
5. W9s, Thresholds, And Urgency Tactics (00:05:17)
6. Training Finance And Out-Of-Band Checks (00:07:25)
7. Promo: CISSP Cyber Training Resources (00:10:43)
8. Defining An Incident And CIA Impact (00:12:17)
9. IR Steps: Detect, Respond, Mitigate, Report (00:16:05)
10. Small Signals, Big Ransomware Fires (00:20:37)
11. Detection Tools And User Reporting (00:23:05)
12. Process Discipline And Avoiding Ghost Chases (00:27:04)
13. Low And Slow Attackers And Third Parties (00:30:20)
14. Response Playbooks And Prepped Legal Teams (00:33:25)
15. Retainers, CSIRTs, And Evidence Handling (00:36:52)
16. Reporting, Regulators, And Public Affairs (00:41:04)
17. Recovery First, Then Documentation (00:45:12)
311 episodes
Alle episoder
×Welcome to Player FM!
Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.