IT Horror Stories

IT Horror Stories
Podcast Description
If you’ve worked in IT, you’ve probably got a few good ghost stories. This show is dedicated to those stories and the IT heroes who survived to tell the tale. Join some of the world’s top IT leaders as they recount the most harrowing experiences of their careers. They’ll share how they found themselves in hot water, managed to escape disaster, and their best advice for making sure you don’t end up in the sequel. This is IT Horror Stories, where the call is coming from inside the office. Brought to you by NinjaOne, the leader in automated endpoint management.
Podcast Insights
Content Themes
The podcast delves into various topics such as disaster recovery, crisis management, and system resilience with episodes highlighting real-life IT catastrophes, like power outages during Hurricane Sandy, and practical advice for IT professionals to navigate similar predicaments.

If you’ve worked in IT, you’ve probably got a few good ghost stories. This show is dedicated to those stories and the IT heroes who survived to tell the tale. Join some of the world’s top IT leaders as they recount the most harrowing experiences of their careers. They’ll share how they found themselves in hot water, managed to escape disaster, and their best advice for making sure you don’t end up in the sequel. This is IT Horror Stories, where the call is coming from inside the office. Brought to you by NinjaOne, the leader in automated endpoint management.
Negotiating with cybercriminals is no walk in the park. Shelley Ma, incident response lead for Coalition Incident Response, highlights the human element of cybersecurity: dealing with both clients in crisis and the criminals themselves.
——
Guest bio:
Shelley Ma is an incident response lead for Coalition Incident Response, where she assists businesses in managing the response and remediation of cyber breaches. Shelley specializes in ransomware cases and ransomware negotiations, with a high success rate in reducing ransom amounts. As an EnCE-certified examiner, the depth of her experience lies within complex breach investigations, computer forensics, and incident response. Since 2014, Shelley has analyzed, responded to, and investigated thousands of incident cases. She specializes in network intrusion investigations, litigation forensics, intellectual property theft, and related crimes.
———
Time stamps:
01:22 – Shelley’s journey
03:20 – IT’s crisis role
12:20 – Oh, the Horror!
26:00 – The cost of cybersecurity
27:54 – Don’t be in the sequel
———

Disclaimer
This podcast’s information is provided for general reference and was obtained from publicly accessible sources. The Podcast Collaborative neither produces nor verifies the content, accuracy, or suitability of this podcast. Views and opinions belong solely to the podcast creators and guests.
For a complete disclaimer, please see our Full Disclaimer on the archive page. The Podcast Collaborative bears no responsibility for the podcast’s themes, language, or overall content. Listener discretion is advised. Read our Terms of Use and Privacy Policy for more details.