October 3, 2022 By Laurance Dine 3 min read

Over the course of two decades, I’ve seen Incident Response (IR) take on many forms. Cybercrime’s evolution has pulled the nature of IR along with it — shifts in cybercriminals’ tactics and motives have been constant. Even the cybercriminal psyche has completely rebirthed, with more collaboration amongst gangs and fully established ransomware enterprises running. When I was first starting off, I never would’ve guessed “ransomware as a service” would be a thing. I certainly wouldn’t have thought my job would evolve to helping power cities, ships dock, busses stay on track, or grocery stores stock their shelves.

What does that have to do with IR? Well today, everything.

Modern-day cyberattacks have evolved past solely impacting data systems and IT environments. They now impact our access to essential services and goods and the economy. It’s becoming more palpable to businesses and consumers every day. Whether a driver is unable to access gas or a business is spiking its product prices, cyberattacks are leading to real-world repercussions. Hospitals, food manufacturers, schools are also among the victims we’ve seen brought to temporary standstills by ransomware gangs over recent years.

The result? Incident Responders today are charged with much more than defending against data theft; they’re tasked with ensuring the world continues to run. The new front line is digital and those defending it are what stands between society and disruption.

So, to our cyber frontline responders, I say thank you. Thank you for all that you do to keep businesses, consumers, and the world secure. We see you silently tirelessly and passionately holding the line — a line that may not be distinct to the bare eye for many, but one that is certainly there keeping more than our online access, safety, and services intact.

We see you fighting multiple battlefronts in tandem, as the industry deals with a talent shortage that struggles to keep pace with the persistence of cyber threats. And we see you doing all this far from the limelight and accolades, but humbly and confidentially in service of your clients — whether civilians or businesses.

This Cybersecurity Awareness Month, I invite all my peers across the industry and cyber community to celebrate our cybersecurity Incident Responders. They are the men and women who will hop on a plane at a moment’s notice and forego time away from their families for days, even weeks, on end to thwart off cyberattacks and recover control of systems for businesses, governments, and entire countries — dealing with immense pressures as they do so.

And the pressures are many. A timely IBM study showed that in the face of major cybersecurity incidents — from the likes of the infamous 2017 WannaCry and NotPetya attacks to the more recent 2020 Solarwinds incident — IR teams face considerable mental strain, fully aware of their heavily weighing responsibility to secure critical systems.

It’s a sense of service that drives the IR community to do what they do, and we salute them for it and the sacrifice that follows. In fact, the IBM study found that a sense of duty to protect and the opportunity to help others/businesses were the most common reason Incident Responders enter the field. This drive often overrides genuine struggles these individuals encounter because of responding to cyberattacks, such as stress, anxiety, insomnia, impact on personal life — all of which are various forms of effects cited by Incident Responders.

I hope you’ll all join me in recognizing our unsung cybersecurity heroes and celebrating them throughout the month. Consider customizing your own appreciation post to use on social media to give a shoutout to your organization’s #CyberResponders: https://ibm.biz/cyber-responders

Interested in hearing directly from incident responders? Sign up for the “Tales from the Digital Frontlines” webinar with IBM X-Force incident responders on Wednesday, October 12 at 1:00 p.m. ET.

Celebrate #CyberResponders

More from Incident Response

X-Force uncovers global NetScaler Gateway credential harvesting campaign

6 min read - This post was made possible through the contributions of Bastien Lardy, Sebastiano Marinaccio and Ruben Castillo. In September of 2023, X-Force uncovered a campaign where attackers were exploiting the vulnerability identified in CVE-2023-3519 to attack unpatched NetScaler Gateways to insert a malicious script into the HTML content of the authentication web page to capture user credentials. The campaign is another example of increased interest from cyber criminals in credentials. The 2023 X-Force cloud threat report found that 67% of cloud-related…

Tequila OS 2.0: The first forensic Linux distribution in Latin America

3 min read - Incident response teams are stretched thin, and the threats are only intensifying. But new tools are helping bridge the gap for cybersecurity pros in Latin America. IBM Security X-Force Threat Intelligence Index 2023 found that 12% of the security incidents X-force responded to were in Latin America. In comparison, 31% were in the Asia-Pacific, followed by Europe with 28%, North America with 25% and the Middle East with 4%. In the Latin American region, Brazil had 67% of incidents that…

Alert fatigue: A 911 cyber call center that never sleeps

4 min read - Imagine running a 911 call center where the switchboard is constantly lit up with incoming calls. The initial question, “What’s your emergency, please?” aims to funnel the event to the right responder for triage and assessment. Over the course of your shift, requests could range from soft-spoken “I’m having a heart attack” pleas to “Where’s my pizza?” freak-outs eating up important resources. Now add into the mix a volume of calls that burnout kicks in and important threats are missed.…

SIEM and SOAR in 2023: Key trends and new changes

4 min read - Security information and event management (SIEM) systems remain a key component of security operations centers (SOCs). Security orchestration, automation, and response (SOAR) frameworks, meanwhile, have emerged to fill the gap in these capabilities left by many SIEM systems. But as many companies have begun reaching the limits of SIEM and SOAR systems over the last few years, they have started turning to other solutions such as extended detection and response (XDR). But does this shift spell the end of SIEM…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today