Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library

Veeam: From Phish to Foothold — How a VPN Gap Became an Enterprise-Wide Incident—and What IT Can Learn

Truth in IT
11/10/2025
2
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Introduction

This Wake Up podcast episode from Veeam features Michael Irwin recounting a real-world incident response to a nation-state-attributed intrusion. The discussion matters for IT leaders because it translates front-line detection, containment, and leadership challenges into actionable practices—especially around MFA gaps, third-party engagement, and burnout prevention.

Nation-State Intrusion: How It Started and Why It Escalated

Michael Irwin describes an enterprise incident that began with successful social engineering, compromising a user account reused across services. Without MFA on the VPN, the attackers leveraged the same credentials to gain remote access, establish persistence, and move laterally. The initial signal was subtle: anomalous geolocation activity on login attempts—U.S.-based employees showing clusters of successful logins from distant locations and consumer VPN IP ranges. Patterns across multiple users triggered the “aha” moment that this exceeded a routine event.

Severity crystallized when evidence touched privileged or service accounts. Unlike user accounts, service credentials can be embedded in source code and infrastructure, making immediate rotation risky and complex. The organization contained the incident quickly and kept it internal—no customer or PII exposure—yet the operational impact and third-party costs still reached seven figures.

Detection to Containment: Methodical Moves and Missing Pieces

Indicators and triage

The team prioritized containment over immediate full remediation: lock out known-bad access, rotate credentials, and bound the blast radius. Smaller teams faced scarcity of niche expertise (forensic depth, log behavior analysis), prompting engagement with an external incident response provider. Legal and cyber insurance became part of the workflow, as did executive communication around uncertainty and cost.

Third-party validation and acceleration

Bringing in external specialists served two purposes: credibility and capability. They affirmed the containment strategy and supplemented gaps in forensic rigor and evidence handling. Notably, lacking an incident response retainer delayed engagement due to procurement and scheduling—reinforcing the value of pre-negotiated IR retainers for speed-to-action.

The Hard Trade-Off: UX Friction vs. Security Controls

The root cause exposed a classic prioritization challenge. The organization deferred MFA on VPN to align with a planned SSO rollout requiring network upgrades—optimizing for user experience and minimizing change fatigue. The incident struck during that window. With hindsight, Irwin would elevate MFA on external entry points to a top-tier priority regardless of UX sequencing. His evolved approach emphasizes practical risk reduction aligned to common incident causes over pursuit of “perfect” implementation sequencing.

The broader message: progress over perfection. IT leaders must communicate risks clearly, quantify potential business impact, and accept staged rollouts that deliver critical controls early—even if user experience isn’t yet ideal.

Operations Under Duress: People, Process, and Burnout

Running 24x7—then stabilizing

Containment was a days-long, round-the-clock effort; initial remediation spanned weeks; investigation stretched into months. Stress peaked early when the team was determining scope and impact. As facts solidified—what was compromised and what wasn’t—stress declined. Still, small teams with single points of expertise struggled with sustainable shifts, handoffs, and recovery time.

Managing the human system

Irwin underscores that managing responders is as critical as managing the incident: ensuring breaks, hydration, and role clarity. He witnessed a key team member exit during the early stages—an illustration of the field’s burnout risk. Pre-incident preparation, including tabletop exercises and expectations-setting about stress trajectories, can mitigate the shock factor for less-experienced responders.

He also argues for cultural reframing: stop treating incidents as program failures. Success must be judged by containment effectiveness, speed of escalation, and avoidance of reportable harm, not by the fantasy of zero incidents. The “one miss vs. many controls” asymmetry demands a supportive, realistic executive posture.

Governance, Alignment, and Decision Quality

Effective security leadership translates technical risk into business-aware decisions. Irwin highlights the need to brief executives with clear risk narratives tied to business impact and to document intentional trade-offs. That transparency, plus practical prioritization based on prevalent attack vectors, drives better alignment on risk tolerance and investment. He emphasizes that, in constrained environments, there will always be more work than resources—so priority setting and expectation management are continuous disciplines.

Timeline and Outcomes

Irwin’s team moved fast to contain and then engage a third party, even without a retainer. The external firm validated earlier decisions, provided forensic depth, and structured evidence retention. The organization avoided external disclosure obligations due to strong boundary controls and lack of sensitive data exposure. Still, the internal disruption, cost, and human toll were significant—reinforcing the need for preventative controls on external access, retainer-based IR readiness, and load-balanced staffing.

Key Takeaways

  • Prioritize MFA on all external entry points, especially VPN, ahead of UX-ideal sequencing; progress beats perfection.
  • Use geolocation and VPN IP intelligence to catch early lateral movement; patterns across multiple users are critical signals.
  • Secure an incident response retainer to remove procurement delays and accelerate forensics and containment.
  • Manage responders like critical infrastructure: enforce breaks, plan shifts, and prepare teams with tabletop exercises.
  • Reframe success: measure containment speed and impact avoidance, not the absence of incidents.

Conclusion

For IT professionals, this case underscores that incident response is as much about disciplined prioritization and people leadership as it is about tools and telemetry. A single control gap—MFA on VPN—can create months of downstream work. The durable lessons are clear: deploy high-impact controls early, maintain IR readiness with external partners, structure teams to operate sustainably under stress, and align executive expectations to the realities of modern threat models. This is the path to resilient, repeatable outcomes when—not if—incidents occur.

Categories:
  • » Cybersecurity Webinars » Application Security
  • » Cybersecurity Webinars » Backup & Recovery
  • » Data Management » Virtualization
  • » Cloud Webinars » Private Cloud Webinars
  • » Data Management » Data Storage
  • » Cybersecurity Webinars » Data Security
Channels:
News:
Events:
Tags:
  • veeam
  • virtualization
  • backup
  • disaster
  • recovery
  • availability
  • recovery
  • replication
  • data
  • availability
  • data
  • protection
  • backup
  • and
  • restore
  • backup
  • and
  • recovery
  • data
  • recovery
  • veeam
  • availability
  • suite
  • veeam
  • availability
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Veeam: From Phish to Foothold — How a VPN Gap Became an Enterprise-Wide Incident—and What IT Can Learn

              Upcoming Webinar Calendar

              • 11/12/2025
                12:00 PM
                11/12/2025
                Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR
                https://www.truthinit.com/index.php/channel/1545/zendesk-customer-spotlight-pure-insurance-how-to-scale-employee-service-from-it-to-hr/
              • 11/12/2025
                10:00 PM
                11/12/2025
                Transforming AI Buzz into Real Business Value with Druva
                https://www.truthinit.com/index.php/channel/1555/transforming-ai-buzz-into-real-business-value-with-druva/
              • 11/13/2025
                05:00 AM
                11/13/2025
                Transforming AI Buzz into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1554/transforming-ai-buzz-into-tangible-business-value-with-druva/
              • 11/13/2025
                12:30 PM
                11/13/2025
                Insights from a Certified CMMC Assessor: Sidestepping Common Assessment Pitfalls
                https://www.truthinit.com/index.php/channel/1536/insights-from-a-certified-cmmc-assessor-sidestepping-common-assessment-pitfalls/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Advancements in Click Fraud Defense: Insights from LinkedIn and HUMAN for Budget and Campaign Protection
                https://www.truthinit.com/index.php/channel/1583/advancements-in-click-fraud-defense-insights-from-linkedin-and-human-for-budget-and-campaign-protection/
              • 11/13/2025
                01:00 PM
                11/13/2025
                Partner Sales Dialogue: Transform AI Trends into Tangible Business Value with Druva
                https://www.truthinit.com/index.php/channel/1556/partner-sales-dialogue-transform-ai-trends-into-tangible-business-value-with-druva/
              • 11/18/2025
                01:00 PM
                11/18/2025
                HUMAN Dialogue: Fostering Trust Amidst Agentic Commerce Dynamics
                https://www.truthinit.com/index.php/channel/1582/human-dialogue-fostering-trust-amidst-agentic-commerce-dynamics/
              • 11/18/2025
                01:00 PM
                11/18/2025
                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook
                https://www.truthinit.com/index.php/channel/1579/microsoft-advanced-group-policy-management-agpm-end-of-life-your-practical-migration-playbook/
              • 11/20/2025
                05:00 AM
                11/20/2025
                Druva: Prove you can outsmart ransomware in this virtual cyber recovery simulation!
                https://www.truthinit.com/index.php/channel/1619/untitled-channel/
              • 11/20/2025
                11:00 AM
                11/20/2025
                Trend Micro Webinar: Smarter Decision Making via Network Intelligence
                https://www.truthinit.com/index.php/channel/1372/unlocking-network-intelligence-for-smarter-risk-decisions/
              • 11/20/2025
                12:00 PM
                11/20/2025
                360View: Budget Optimization: Doing More with Less
                https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
              • 11/20/2025
                12:00 PM
                11/20/2025
                CMMC Certification: Next Steps for Continuous Monitoring and Management
                https://www.truthinit.com/index.php/channel/1558/cmmc-certification-next-steps-for-continuous-monitoring-and-management/
              • 11/20/2025
                01:00 PM
                11/20/2025
                Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era
                https://www.truthinit.com/index.php/channel/1612/rethinking-hybrid-access-securing-users-vendors-and-infrastructure-in-the-zero-trust-era/
              • 12/04/2025
                12:00 PM
                12/04/2025
                CMMC Level 2 Assessment Insights: Expectations from an OSC and C3PAO Assessor
                https://www.truthinit.com/index.php/channel/1557/cmmc-level-2-assessment-insights-expectations-from-an-osc-and-c3pao-assessor/
              • 12/09/2025
                01:00 PM
                12/09/2025
                Energize Your Connections with Netskope and Presidio Collaboration
                https://www.truthinit.com/index.php/channel/1553/energize-your-connections-with-netskope-and-presidio-collaboration/
              • 12/10/2025
                01:00 PM
                12/10/2025
                The Next Generation of Managed Data Security Services
                https://www.truthinit.com/index.php/channel/1620/cyera-the-next-generation-of-managed-data-security-services/
              • 12/10/2025
                10:00 PM
                12/10/2025
                Enhancing Revenue Opportunities: Bridging Gaps with Druva’s Microsoft Expansion in APAC
                https://www.truthinit.com/index.php/channel/1624/enhancing-revenue-opportunities-bridging-gaps-with-druvas-microsoft-expansion-in-apac/
              • 12/11/2025
                05:00 AM
                12/11/2025
                Maximize Revenue Potential: Address Gaps with Druva’s Microsoft Expansion
                https://www.truthinit.com/index.php/channel/1625/maximize-revenue-potential-address-gaps-with-druvas-microsoft-expansion/
              • 12/11/2025
                12:00 PM
                12/11/2025
                Secureframe: Addressing the Top 5 Compliance Challenges for Startup Leaders and Solutions
                https://www.truthinit.com/index.php/channel/1526/addressing-the-top-5-compliance-challenges-for-startup-leaders-and-solutions/
              • 12/11/2025
                01:00 PM
                12/11/2025
                Enhance Revenue Streams: Address Gaps with Druva's Microsoft Expansion Solutions.
                https://www.truthinit.com/index.php/channel/1623/enhance-revenue-streams-address-gaps-with-druvas-microsoft-expansion-solutions/
              • 12/18/2025
                12:00 PM
                12/18/2025
                360View: 2026 IT Predictions & Emerging Trends
                https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/

              Upcoming Spotlight Events

              • Nov
                18

                Microsoft Advanced Group Policy Management (AGPM) End of Life: Your Practical Migration Playbook

                11/18/202501:00 PM ET
                • Nov
                  20

                  Rethinking Hybrid Access: Securing Users, Vendors, and Infrastructure in the Zero Trust Era

                  11/20/202501:00 PM ET
                  • Dec
                    10

                    The Next Generation of Managed Data Security Services

                    12/10/202501:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Nov
                      12

                      Zendesk Customer Spotlight [Pure Insurance]: How to Scale Employee Service from IT to HR

                      11/12/202512:00 PM ET
                      • Nov
                        12

                        Transforming AI Buzz into Real Business Value with Druva

                        11/12/202510:00 PM ET
                        • Nov
                          13

                          Transforming AI Buzz into Tangible Business Value with Druva

                          11/13/202505:00 AM ET
                          More events

                          Upcoming 360 View Events

                          • Nov
                            20

                            360View: Budget Optimization: Doing More with Less

                            11/20/202512:00 PM ET
                            • Dec
                              18

                              360View: 2026 IT Predictions & Emerging Trends

                              12/18/202512:00 PM ET
                              More events

                              Recent Spotlight Events

                              • Oct
                                22

                                Cut Ticket Resolution Time in Half with Smarter IT Documentation

                                10/22/202501:00 PM ET
                                • Oct
                                  15

                                  Managing Human Risk in an AI-Driven Threat Landscape: Are Your Defenses Evolving Fast Enough?

                                  10/15/202501:00 PM ET
                                  • Sep
                                    16

                                    KnowBe4: Beyond DMARC: Closing Critical Gaps in Your Email Security Shield

                                    09/16/202501:00 PM ET
                                    More events

                                    Recent Industry Events

                                    • Oct
                                      30

                                      Rethinking Secure Access Beyond VPN and NAC for a Zero Trust Era

                                      10/30/202512:00 PM ET
                                      • Oct
                                        30

                                        Rethink secure access solutions in a zero trust landscape beyond VPN and NAC.

                                        10/30/202506:00 AM ET
                                        • Oct
                                          29

                                          Practical Strategies for Platform Engineering in the AI Era

                                          10/29/202512:00 PM ET
                                          More events
                                          Truth in IT
                                          • Sponsor
                                          • About Us
                                          • Terms of Service
                                          • Privacy Policy
                                          • Contact Us
                                          • Preference Management
                                          Desktop version
                                          Standard version