You’ve been hacked. Should you call the FBI?

On this episode of the IoT: The Internet of Threats podcast, Jeff Tricoli, Former Section Chief at the FBI Cyber Division joins podcast host Eric Greenwald to discuss what to know about working with the FBI on cybercrime, the evolution and ethical implications of the ransomware industry, and the differences between cyberattacks from Russia and China.

Interview with Jeffrey Tricoli: 

For nearly 20 years, Jeffrey Tricoli served in a variety of roles at the FBI’s Cyber Division and most recently as its Sector Chief in charge of overseeing national cyber investigations. Jeff graduated from the University of Syracuse’s Maxwell School with an M.P.A. in Public Policy Analysis and holds a Bachelor of Arts from Canisius College. Jeff is now a senior executive at a financial services company responsible for technology and security risk.

 

The FBI’s Cyber division investigates and responds to malicious cyber activities that threaten the safety of the US public and the country’s national and economic security.

 

In this interview, Eric and Jeff discuss:

  • The different motives that drive Russian and Chinese cyberattacks

  • How events like the war in Ukraine or trade wars with China amplify the threats of destructive cyberattacks and intellectual property theft

  • How companies should approach their relationship with law enforcement before, during, and after a cyberattack

  • What it’s like to collaborate with the FBI when your organization faces a threat or breach

  • The challenging ethics that businesses face when they’re presented with a ransom demand to recover their data

 

Find Jeff on LinkedIn

Jeffrey Tricoli: https://www.linkedin.com/in/jeffrey-tricoli-b5791aaa

 

Learn more about the FBI’s efforts to combat cyber threats: https://www.fbi.gov/investigate/cyber

 

Thank you for listening to this episode of the IoT: The Internet of Threats podcast, powered by Finite State — the leading supply chain cyber-security solution provider for connected devices and embedded systems.

 

If you enjoyed this episode, click subscribe to stay connected and leave a review to get the word out about the podcast.

 

To learn more about building a robust product security program, protecting your connected devices, and complying with emerging regulations and technical standards, visit https://finitestate.io/.

Previous
Previous

The Truth about Ransomware (and How to Stop It), with Megan Stifel of IST

Next
Next

Medical Device Security: Should I worry about my pacemaker being hacked?