Last updated at Wed, 21 May 2025 14:00:00 GMT

In one of the most anticipated sessions of Take Command 2025, Raj Samani, Chief Scientist at Rapid7, sat down with Trent Teyema, former FBI Special Agent and President of CSG Strategies, for a candid conversation on how threat actors are evolving and what defenders must do to keep up.

Moderated by Brian Honan, CEO of BH Consulting, the panel pulled no punches. From the economics of ransomware to the risks of overrelying on static indicators of compromise, Inside the Mind of an Attacker: Navigating the Threat Horizon served as both a wake-up call and a roadmap for modern security strategy.

Cybercrime is thriving — and getting smarter

It’s no longer about lone hackers. As Raj put it, “Ransomware has become a business.” Today’s threat actors are highly organized, well-resourced, and increasingly leveraging professional tools and affiliate networks.

One striking takeaway: groups like RansomHub are reportedly earning tens of millions of dollars per quarter, reinvesting that revenue into toolkits, infrastructure, and even “customer service” operations for negotiating with victims.

Panelists discussed the trend toward secondary extortion tactics, where attackers threaten to notify regulators like the SEC if ransom demands aren’t met — a calculated move to increase pressure without deploying additional payloads.

From indicators to context: why threat intelligence must evolve

One of the biggest challenges facing defenders today is the lack of actionable, context-rich intelligence. While threat intel feeds are abundant, the signal-to-noise ratio is still too high.

“We don’t just need more data. We need better context,” Raj emphasized.

The panel discussed how defenders must move beyond static IOCs and invest in behavioral analysis, context-aware detection, and real-time telemetry to truly stay ahead of threats.

A recent stat from the post-event survey reflects this shift: only 18% of respondents said their organizations integrate threat intelligence into exposure management very effectively.

To beat an attacker, think like one

The message came through clearly: organizations that adopt a proactive, attacker-informed mindset are better equipped to defend against modern threats. That means:

  • Red teaming with real-world attacker playbooks
  • Understanding how ransomware operators stage and execute campaigns
  • Practicing lateral movement detection before it happens

Trent Teyema, drawing on his FBI experience, pointed out that too many organizations still rely on legacy thinking: “They treat cyber like IT, when they should be treating it like crime.”

Paying ransoms: a business risk, not a moral judgment

Both speakers addressed the uncomfortable reality: sometimes ransoms are paid. And while this remains a contentious topic, the panel framed it clearly - it’s a business decision, not a moral one.

Raj urged teams to have ransomware playbooks and decision frameworks defined in advance. This includes:

  • Knowing legal constraints (especially around sanctions and OFAC-listed entities)
  • Understanding the implications of payment
  • Engaging with experienced negotiation partners if needed

Visibility still reigns supreme

From attack surface awareness to SOC visibility gaps, the theme of visibility was woven throughout the session.

As Raj noted, "You can't protect what you don't know about."

The panel closed with a call to action: unify your data, reduce siloed tools, and build detection and response around context, not just coverage.

Watch the full session on demand

If you missed this conversation — or want to rewatch it with your team — the full session is now available.

[Watch Inside the Mind of an Attacker On Demand]