Kiersten Todt (@kierstentodt) 's Twitter Profile
Kiersten Todt

@kierstentodt

Chief of Staff, Cybersecurity and Infrastructure Security Agency

ID: 857419562916077568

linkhttp://www.libertygroupventures.com calendar_today27-04-2017 02:22:08

38 Tweet

821 Followers

38 Following

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

The White House Cyber Executive Order is a comprehensive and prescriptive roadmap for addressing the nation's most pressing cyber challenges. It uses government's buying power to demand improved software security. The Power of the Purse for good could be a game-changer.

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

The problem is far-reaching and impacts enterprises of all sizes, including schools, hospitals, and small businesses that are critical components of global supply chains

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

Organizations - especially small businesses - should be focused on stronger authentication. Ransomware is caused by breached access to your network - harden the access through stronger authentication, stronger passwords. #GCAChat #ransomware

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

Small businesses and small enterprises - including local governments - are the most at risk. These SMBs are resource-constrained. But, there are basic steps SMBs can take to be resilient against ransomware - strong passwords, auto updates, and MFA! #GCAchat #Ransomware

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

CRI developed a ransomware playbook in collaboration with DHS that offers steps SMBs can take to be resilient against a ransomware attack, and a decision tree to guide you through a response. #GCAChat #Ransomware

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

The need to address ransomware and to engage industry and government in a prescriptive approach is urgent - all of our communities are impacted. #GCAChat #Ransomware

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

Cyber hygiene is about doing the basics - strong passwords, multi-factor authentication, auto updates, phishing education....like brushing your teeth, washing your hair... #GCAChat #Ransomware

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

As with all serious, global cyber threats, the US cannot do this on its own. We need to be collaborating with like-minded economic partners and allies on norms and standards. #GCAChat #Ransomware

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

We also need to engage with international partners in defining consequences for crippling criminal activity. As long as ransomware can be conducted without consequences, it will continue to be the most profitable global business. #GCAChat #Ransomware

Phil Reitinger, Principle Engineer (@carpediemcyber) 's Twitter Profile Photo

I'd refer people to the #RTF report. And we don't need general international discussions about the scourge of #ransomware. We need immediate steps taken by governments in concert to protect against ransomware, deter cyber extortionists, and change the business model. #GCAChat

J. Michael Daniel (@cyallianceprez) 's Twitter Profile Photo

GlobalCyberAlliance We need responsible govts to collaborate to reduce safe havens where cyber criminals hide. We need to incorporate cryptocurrency exchanges more fully into the global financial system. We need govts working together w/pvt sector to disrupt the ransomware ecosystem. #GCAChat

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

We also need to look at the incentives being created by the insurance market. Criminal actors troll companies to assess their ransomware insurance payouts in determining which companies are good targets: $$$$insurance payout = ransomware target #GCAChat #Ransomware

Cybersecurity and Infrastructure Security Agency (@cisagov) 's Twitter Profile Photo

GlobalCyberAlliance We work closely with the FBI and U.S. Secret Service to analyze ransomware attacks when they are reported to help with incident response. If you are a victim, make a report here: us-cert.gov/report and contact your local FBI field office. #GCAChat

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

Thanks to CISA for their collaboration in our joint ransomware playbook which can be found at BeCyberReady.com under "Resources" #GCAChat #Ransomware

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

By focusing on the human behavior of employees, SMBs can become more resilient against ransomware - educate your employees on what a strong password is, enable multi-factor authentication and auto updates, provide phishing education. #GCAChat #Ransomware

Kiersten Todt (@kierstentodt) 's Twitter Profile Photo

These orgs provide great resources to combat ransomware GlobalCyberAlliance Cyber Threat Alliance Institute for Security and Technology Cybersecurity and Infrastructure Security Agency go to BeCyberReady.com and sign-up for the Cyber Readiness Program to combat ransomware or access the Ransomware Playbook under "Resources" #GCAChat #Ransomware