Living Through A Security Event – Recording Available

February 5th, 2026
Living Through A Security Event – Recording Available

“Living Through a Security Event” is a practical, experience‑driven presentation that walks organizations—especially K‑12 districts—through the realities of preparing for, responding to, and defending against cybersecurity incidents. It emphasizes legal considerations, communication strategy, cyber‑insurance obligations, and modern attack behaviors.

1. Legal Considerations & Communication

The presentation consistently reinforces that organizations must work closely with legal counsel—especially those with cybersecurity expertise—to avoid missteps. Critical terminology (e.g., “breach”) has legal implications and should not be used without advice. Clear communication protocols are essential: decide who speaks publicly, what is said, and maintain a single coherent narrative.

2. Incident Response Planning

Three types of organizations are described:

  • those without a functional incident response plan,
  • those with a flawed plan, they adapt on the fly, and
  • those who revise their plan after every event.

The most successful are those who refine their IR plans through continuous learning. Knowing reporting obligations, especially for NYS and regulators, is essential.

3. Cyber Insurance Requirements

Cyber insurance policies often mandate specific procedures, preferred vendors, forensic requirements, and immediate reporting. Failure to follow policy requirements—or to report even minor events like business email compromise—can jeopardize coverage. Full claim payouts may take nearly a year.

4. Modern Attack Patterns

The presentation explains how attackers gain footholds—commonly on holiday weekends—and how advanced threats “live off the land,” using built‑in tools instead of malware to evade detection. Bots often establish persistence before executing commands. Attack vectors include misconfigurations, compromised endpoints, privilege escalation, and techniques like Pass‑the‑Hash.

Once attackers obtain domain admin rights, a full‑network compromise may occur within 4–8 hours.

5. Defense Strategy: Reducing Dwell Time

Defense is framed around minimizing dwell time, the period during which attackers operate undetected. Traditional endpoint protection is insufficient against modern behavior‑based attacks. The presentation urges organizations to implement layered defenses that force attackers to be “noisy,” increasing the likelihood of detection.

6. “Noise‑Making” Security Controls

Recommended defensive measures include:

  • DNS enforcement and filtering
  • Rigorous patching of OS, browsers, and third‑party apps
  • Eliminating unquoted paths
  • Restricting users to limited permissions
  • Using LAPS, PAM, and application blocking
  • Monitoring RDP/RAT usage
  • Continuous vulnerability scanning and behavioral monitoring
  • Ensuring complete endpoint protection coverage

The goal is to complicate the attacker's progress and expose malicious behavior earlier.

7. New Defensive Capabilities

Additional tools—SOC oversight, cloud‑based monitoring (Google, M365), syslog collection, AD auditing, and vulnerability management—provide critical visibility into suspicious activity, especially in the “white space” traditional tools miss.

Watch the presentation here.