Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
CybersecuritySecurity & Business Resilience

Consider these credentials when hiring a ransomware negotiator

By Kurtis Minder
Hire a ransomware negotiator for your enteprise
December 8, 2020

2020 saw a significant increase in the number ransomware attacks due to the expanded attack surface and vulnerabilities caused by the pandemic and distributed workforce. On top of that, in October 2020, the U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued an advisory noting that companies can be fined if they make a ransomware payment. This leaves companies in a tough spot – especially smaller ones with limited means that may be facing an existential crisis when they get attacked by ransomware.

Ransomware negotiator breeding ground

It’s understandable how companies can become generally frantic after getting hit with ransomware: They can’t access their data, they can’t operate their business and they don’t know what to do. The government tells them not to pay ransom but the insurance company, if they have cyber insurance, is saying to pay the attacker. 

Most companies, even within security staff, do not have experienced ransomware experts and crisis negotiators on staff, so they need to turn to outside experts. This has created a fertile breeding ground for the nascent ransomware negotiator industry. But, as it stands now, it is an industry with no certifications or professional associations, so anyone can call themselves a ransomware negotiator. And, in some cases, inept ransomware negotiators have left companies in worse shape than they found them in by inciting threat actors to do even more damage. 

Ransomware negotiator credentials

So, what should you look for when hiring a ransomware expert to drive crisis planning and response at your enterprise? Here are four critical credentials:

  1. Documented experience with successful ransomware negotiations – Ransomware negotiators require specialized skills. If you’re embroiled in an intellectual property (IP) lawsuit, you don’t just hire a general-purpose lawyer for the job. You hire an IP specialist. The same dynamic applies here − companies need help from experts with specialized experience in cyber intelligence and ransomware, so they can effectively validate the threat (believe it or not, some threat actors are less than truthful) and develop a remediation strategy based on your business risk profile.
  2. Demonstrated understanding of various threat actors and syndicates – Experienced ransomware negotiators will know how to deal with the types of ransomware attacks by both threat actor syndicates and “freelancers.” Each of these situations calls for different approaches – the threat actor syndicates tend to follow a “playbook” that can be more predictable than a lone threat actor. For example, a syndicate is likely to be extorting multiple victims at a time, which could make them more amenable to a quick settlement, even if it's significantly reduced from the original ask. On the other hand, you might be the only victim for a freelancer, which means they’ll be trying to maximize their profit. As with any negotiation, knowing the adversary is critical to a successful outcome.  
  3. Executive-level business acumen – Experienced negotiators will not only be able to deal with and respond appropriately to the threat, but also understand the victim’s priorities and communicate with security leaders and C-level executives as part of the process. Ransomware is not just a cybersecurity problem; it’s a corporate crisis. And, as with any corporate crisis, critical decisions need to be made from the top level – like whether or not to pay the ransom, how to notify investors, how to respond to regulatory exposure, etc. Negotiators need to be able to guide companies through this process so executives understand the situation and their responsibilities, and they also need to have the ability to “play Switzerland” in what can be a tumultuous situation with many factors at play, including emotions, differences of opinion, internal politics and more.
  4. The ability to coordinate effective corporate crisis response – Negotiators need to evaluate the company’s corporate crisis response plans and determine if they have the proper integration of legal, communications, law enforcement, finance, the board and other functions to avoid compliance violations, lawsuits and reputation damage after payment. Legal is one of the most integral parts of the equation, so the ability for a negotiator to clearly understand the legal ramifications is paramount.

As reports in the news have clearly demonstrated, ransomware is easy money for threat actors, which is why attacks continue to proliferate. It is critical that chief security officers, regardless of size, take ransomware attacks as seriously as they do other risks. There is only one chance to do it right – and there are endless ways for negotiations to end badly – including angering the threat actor so you become a repeat target, where the threat actor collects the ransom and attacks the company again. Experienced negotiators will help validate threat actors claims and also ensure as best they can that they hold up their end of the bargain.

The best approach is to engage a ransomware negotiator before you’re attacked, so they can work with you to create a sound crisis response plan. Then, when an attack hits, instead of feeling frantic, you’ll know exactly who to call.

KEYWORDS: cyber security cybersecurity defense cybersecurity preparedness ransom ransomware

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Kurtis minder groupsense headshot

Kurtis Minder is CEO and co-founder at GroupSense, a threat intelligence company. Minder leads a team of analysts and technologists providing custom cybersecurity intelligence to brands around the globe. The company’s analysts conduct cyber research and reconnaissance and map the threats to client risk profiles. He arrived at GroupSense after more than 20 years in role-spanning operations, design and business development at companies such as Mirage Networks (acquired by Trustwave), Caymas Systems (acquired by Citrix) and Fortinet (IPO).

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Leadership and Management
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • people talking to pharmacist at counter

    How pharma organizations can combat third party cyberattacks

    See More
  • cyber-enews

    What to Consider When Developing a Cybersecurity Strategy

    See More
  • digital workplace

    7 Essential Security Factors to Consider When Choosing Your Enterprise’s Messaging Platform

    See More

Related Products

See More Products
  • physical security.webp

    Physical Security Assessment Handbook An Insider’s Guide to Securing a Business

  • Physical Security and Safety: A Field Guide for the Practitioner

  • Optimizing Social Media from a B2B Perspective

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing