This transcription is provided by artificial intelligence. We believe in technology but understand that even the smartest robots can sometimes get speech recognition wrong.

 Hey everyone. I'm Drex and this is the two minute drill. It's great to see you today. Here's some stuff you might wanna know about last Friday in the two minute drill extra. I told you that the FBI Department of Justice, other law enforcement agencies had torn down the websites and infrastructure for handle the Iranian backed hacking group that had taken down medical technology company Stryker just.

About a week prior using a wiper attack. These HON websites aren't just websites, they're the hacking group's megaphone. It's where they make the case to the rest of the world about why they did what they did and how it's justified in their minds. If ELA were a company, the websites would be their primary marketing and communication arm, and it serves to help motivate other cyber criminals who might have similar cyber thuggery in mind.

Those websites are also where they post stolen data. It's where they make threats about their next move, and in a nutshell, it's where they shape the narrative. For any activity that they decide to initiate. So by taking those websites down on paper, big win. But you know how I harp all the time about the importance of resilience and about good backups and testing your ability to restore and minimum viable hospital and doing serious exercises and all that stuff.

The critical ability to bounce back quickly and keep your operation running when the worst day ever happens to your organization. Well, it turns out that one of the best examples of resilience might be the handle hacking crew, and I've said this about cyber criminal groups before. While I despise them, I sometimes have to admire their ability to be creative and to run innovative, and in this case, incredibly resilient businesses because it turns out within 24 hours of the FBI and DOJ website takedown, the group was back online.

New domains, same operations, same message, like nothing ever happened. And that tells you something that we don't talk about enough. The bad guys take resilience very, very seriously. They plan for disruption. They assume take downs will happen. They build infrastructure that can be burned and rebuilt overnight.

They don't build for permanence. They build for continuity. It's a little different from the traditional healthcare question, can we prevent this EV incident from ever happening? Because of course you're gonna try to do that, but the bad guys are clearly relentlessly focused now on asking How fast can we recover from losing everything?

How do we design and build for that? Because their product, at least for Honda and other similar cyber enabled psychological operations, isn't just to break into systems. It's to control the story and create fear and apply pressure and healthcare's right in the middle of that storm right now. So even when the initial target is a vendor, the impact doesn't stay there at ripples.

Ordering systems, supply chain, clinical workflow, real world operations, patients and families. Now Zoom back out for a second. We took down their domains and they rebuilt within our, that's resilience. It's not the kind we like, but it's the kind that works. So maybe the question we should be asking isn't, can we stop them?

Maybe the question we should be asking is, can we operate as well under pressure as the bad guys do? 'cause I don't know, that might be a good goal for us. Thanks for being here. That's it for today's two minute drill. As always, I'd like to hear what you're thinking. Return Fire is always welcome and as always, stay a little paranoid.

I'll see you around campus.