Episode 43 — Execute containment choices that reduce risk without crippling the business

This episode explores containment as a set of controlled options with tradeoffs, because GSOM questions often ask you to choose a response that reduces attacker capability while preserving critical operations and investigative integrity. You will define containment goals such as stopping spread, preventing further access, and protecting data, then map them to actions like isolating endpoints, disabling accounts, blocking network paths, revoking tokens, or tightening conditional access policies. We will discuss how to choose the least disruptive action that still meaningfully reduces risk, and how to stage containment when you are not fully sure of scope, such as isolating high-risk assets first while monitoring for breakout behavior. Troubleshooting scenarios include containment steps that break production workflows, attackers reacting by accelerating exfiltration, and gaps where containment cannot be verified due to missing telemetry, with best practices for approvals, communication, rollback planning, and validation checks. Produced by BareMetalCyber.com, where you’ll find more cyber audio courses, books, and information to strengthen your educational path. Also, if you want to stay up to date with the latest news, visit DailyCyber.News for a newsletter you can use, and a daily podcast you can commute with.
Episode 43 — Execute containment choices that reduce risk without crippling the business
Broadcast by