
Episode: Dissection of Uber Security Chief Conviction
In this episode, we take the dissection of Uber security chief officer going to jail for interference in the 2016 breach. This ruling from a federal judge set the presidents on many different fronts. This also jeopardizes the sanctity of being a CISO and sets the tone that many companies will throw their CSO/ CISO sacrificial lamb.
With: Ricoh Danielson
Oct 6, 2022
7 min

Episode: Ransomware Negotiation
By: Ricoh Danielson
In this episode we cover; ransomware negotiation, define a process for ransomware negotiation and also understand the phases of ransomware negotiation.
Sep 28, 2022
9 min

1st Responder Radio
Eps 7. HIT-T: High Intensity Technical Team
By: Ricoh Danielson
Episode covers:
“Time is money,” a phrase commonly used throughout the years to highlight the importance of
wealth, specifically financial gain. From a cyber security perspective, however, the phrase can
mean the complete opposite. In the moment of a cyber incident, the phrase “time is money”
goes into effect due to the importance of a timely response in order to not lose money and
more importantly, customers. Decisions need to be made quickly and without hesitation as
there may not be enough time to call up a team of executives and attorneys to discuss what
needs to be done in depth. That being said, when an incident does occur, it is crucial to have a
HIT-T and level threshold that allows you to evaluate and determine how the incident will be
handled. For example, a company may have a level threshold of 0 to 5 and when an incident
occurs, the level determines how they will respond. If it is considered a level 0, the company
may determine that to be low risk (e.g. suspicious email found) and the response time does not
have to be immediate. In fact, having a HIT-T that is on-call for a cyber incident allows them to
evaluate and determine level threshold.
“Remember, you are your own 1st Responder.”
-Ricoh Danielson
Nov 3, 2021
5 min

1st Responder Radio:
By: Ricoh Danielson
Cyber Risk Management Determining Business Function
Cyber Business. Ricoh Danielson Nov 2nd, 2021
In today’s era, when companies are undergoing digital transformation, cyber security is increasingly becoming one of the most significant concerns. As a result, before any kind of infrastructure is built, cyber security is an essential factor being considered, along with others.
This is because, on the one hand, organizations and businesses are employing technology to make their workflows efficient, create innovative products to solve real-time problems across sectors, and on the other hand, cybercrimes are increasing in number.
Furthermore, these cyberattacks are evolving with time, and the infrastructures of businesses are not always resilient to them. This makes cyber security a critical concern.
Nov 2, 2021
4 min

1st Responder Radio:
By: Ricoh Danielson
In this episode we cover the cyber warfare tactics and also how cyber warfare is very much like warfare. Threat actor has deployed new tactics very similar to the tactics seen in the battlefield of Iraq and Afghanistan.
Oct 29, 2021
7 min

Blockchain Digital Forensics Investigation
With an increasing global trend toward cryptocurrency, there is a need for developing better blockchain systems and investigation procedures. A greater understanding of metadata in the blockchain will trace the money transactions in businesses and the marketplace. The forensic investigation involved in the blockchain system is a decentralized database in the peer-peer network, diminishing the subpoenas and court motions related to banking issues in business. Blockchain technology provides a comprehensive view of the transaction to the original end. This is a great success in the forensic field.
This powerful forensic technology enables
• Better transactional efficiency due to increased trust.
• Reduction in fraud because of increased transparency.
• Reduction in transaction costs due to elimination of specific ownerships etc.
The blockchain system is a secure and immutable system between the blocks and the transactions in cryptography. It has greater traceability, auditability, accountability and transparency. This system is successfully used in various fields, including energy industries, supply chain, financial services and pharmaceutical. Blockchain technology is also promising for forensic applications.
Blockchain forensics and smart contracts provide all the data via a ledger transaction tracking system. We can access the information where the money is transferred for which purchase, including time and dates.
One thing worth considering is that cryptocurrency is coming with a high demand for privacy. With decentral banking, it will make investigation very hard on the cryptocurrency business. Privacy rights are hard to challenge in court or on any platform. Blockchain technology provides self-verification for digital evidence, which is a benefit in digital forensics.
Call to Action:
• Teaming up and doing working session involving investigators and Technologies is the need of the hour. Investigators can come up with new ways of how blockchain can provide metadata and improve the investigation.
• From the Technology perspective, I highly encourage my fellow technologist to team up with the local investigation company/ firm .this relationship can provide examples of how blockchain and smart contracts work. These collaborative efforts can prove a dynamic unfold to serve our customers during investigations better.
• This is where technologist, programmers and other investigators need to work together in synchronization.
• This team effort can give rise to better solutions and skill sets covering all technical perspective for a secure and smooth business of all types.
About Author
Ricoh Danielson has elaborative experience in handling cyber events, and digital forensic investigations assist businesses in managing the cyber incident response items. Rachel helps to tackle the threats and risks of the digital world.
Ricoh has handled cyber incidents for major Healthcare companies, Healthcare Hospitals and Hospital universities, renowned Financial Firms, and prevalent chain retail restaurants. He is also a Digital Forensics expert for Criminal and Civil cases.
Ricoh is a graduate of Thomas Jefferson School of Law, a graduate of UCLA, a graduate of Arizona. He has many cyber certifications as well.
Apr 30, 2021
4 min

Stoicism during Cyber Security Incidents
Stoicism is an ancient philosophy that describes how to strengthen minds and weed out the negative and non-productive thoughts and build up positive and productive thinking. Not diving into the depth of this ideology, the bottom line of this philosophy is what is essential while dealing with and managing cybersecurity threats. It teaches that the path to happiness is accepting the moment as it presents itself. There are some things you can control, and there are some things you cannot. So the uncontrollable factors in cybersecurity can be dealt with by being a stoicist.
Stoicism -mental management tool in cybersecurity
Cybersecurity is all about the activeness and control of the mind. You must be prepared and fully aware of the possible risks and attacks and have a strategy to work upon in case of any response immediately. After making all the possible efforts remain calm; you may not stop and are not under your control. Stop worrying and thinking about them as it will not change but only affect your mind and health. Being a stoicist is highly beneficial for an IT professional as they are always among security threats like Ransome attacks, crashing servers, buggy codes, network outages and many more.
It is essential to consider and focus in any situation what you can and roll with it. Do not waste time and energy on the things you cannot do anything about. During an incident response or digital forensic legal matter, focus on what you can control and invest time and effort in that direction. We all know that cyber-attacks will happen despite the due diligence and hard work to prevent them. Things do not go the way we plan always. The best we can do is make the preparation we can as cyber preemptive security practices. We have a shot at staying in the game.
Practicing Stoicism in Cyber Security
Focusing on the items you can control and let go of the items you can not help manage your mental power and stability. If we get caught in the fears of 'what if this happens''? We will not perform fully in the mainstream of our work.
In the book "Lead Yourself First: Inspiring Leadership Through Solitude", the writer explains how excellent and dynamic leaders lead their nations in times of crisis by engaging in stoicism and solitude, focusing their efforts on the items they could control. This strategy kept them moving ahead toward prosperity. Try the same strategy. Look at what you have in front of you and what you can do about it. After doing your part, leave the rest to settle.
The Call to Action:
Stoicism offers us a set of practices that can strengthen our will and makes us unshakable even in tough times of cyberattacks. It is developing a mindset that helps us understand what we can control and what we cannot. This philosophy can bring tranquillity and peace even in the most stressful days of cyber threats.
About Author
Ricoh Danielson has elaborative experience in handling cyber events, and digital forensic investigations assist businesses in managing the cyber incident response items. Ricoh helps to tackle the threats and risks of the digital world.
Ricoh has handled cyber incidents for major Healthcare companies, Healthcare Hospitals and Hospital universities, renowned Financial Firms, and prevalent chain retail restaurants. He is also a Digital Forensics expert for Criminal and Civil cases.
Ricoh is a graduate of Thomas Jefferson School of Law, a graduate of UCLA, a graduate of Arizona. He has many cyber certifications as well.
Apr 17, 2021
3 min

Cyber Advisory Board
By: Ricoh Danielson
Date: 03/25/2021
What is cyber advisory/ consultation?
As global hackers are coming up with new ways of fraud and destruction, cybersecurity consultation is now a need of every online business system. Many businesses, firms, and organizations need guidance at the financial, operational, and legal level, but now we are starting to see Cyber Professionals having a chair at the table. Having a Cyber Professional on your Board of Advisory can be one of the best moves to help your organization strengthen the cyber world's core values.
Why is cyber advisory necessary?
Is it really worth paying a reasonable amount of your revenue to hire or get the consultation services of a cyber advisor? The plain answer is yes. A cybersecurity advisor can work and figure out the weaknesses in your system and guide you on strengthening your systems to prevent cyber attacks. In case of any problem or cyber-attack, an advisor can help you take prompt and proper action to safeguard your system and save your data and files from getting breached or corrupted.
Manage a competent cyber advisory
How will you do it? It not much difficult. You can hire a person or a group depending upon the kind of system you have and the safety requirement it demands. The team may comprise of
• Network security consultant
• Database security consultant
• Computer security consultant
• Information security consultant
Or you may have a single advisor fulfilling your requirements. The important thing is you have to know what services your system wants. Make a thorough discussion with the persons willing for consultancy and select the most suitable for your setup.
Conclusion
In this growing digital era, when we are working with digital data in every field of our life, there is an increased risk to the security of our sensitive data. A cybersecurity advisor can assist us in evading security risks and prevent cyber attacks. The heavy reliance on technology and digitalization demands an experienced cybersecurity advisor to protect the systems and business from the emerging threats of cybercrimes.
About Author
Ricoh Danielson has elaborative experience in handling cyber events, and digital forensic investigations assist businesses in managing the cyber incident response items. Rachel helps to tackle the threats and risks of the digital world.
Ricoh has handled cyber incidents for major Healthcare companies, Healthcare Hospitals and Hospital universities, renowned Financial Firms, and prevalent chain retail restaurants. He is also a Digital Forensics expert for Criminal and Civil cases.
Ricoh is a graduate of Thomas Jefferson School of Law, a graduate of UCLA, a graduate of Arizona. He has many cyber certifications as well.
Apr 7, 2021
4 min

1st Responder Radio Podcast Episode 1
With: Ricoh Danielson
Welcome episode where we we cover purpose, mission and intention of the 1st Responder Radio Podcast.
By: 1st Responder and Ricoh Danielson
Apr 2, 2021
55 sec
