[Ep.2] The Rise of Ransomware: Planning for When, Not If

Logo
Presented by

Doug Cahill - Senior Analyst, ESG and Bassam Khan - VP of Product and Technical Marketing Engineering at Gigamon

About this talk

Think your backups are a panacea for ransomware defense? Think again. Traditional backups are no longer enough and despite ransomware being a popular business model for cybercriminals for years, it’s gaining relevance with supply chain attacks, and big game hunting - attacks on enterprises - are increasing. Graff, JBS, Colonial Pipeline and software manager Kaseya are just some of the businesses held to ransom recently. With Colonial paying $4.4 million and JBS $11 million, it’s more essential than ever that CISOs are clued up on the latest in threat intelligence as enterprise ransomware attacks become more targeted and less ‘spray and pray’. This rise of ransomware is coupled with the shift from remote to hybrid working, which has seen the number of remote endpoints and intruder attack space both increasing exponentially. It’s the perfect storm, and organizations must know how to effectively battle ransomware by planning ahead and preparing for the inevitable. In episode 2 of Revisiting Threat Models in the Cloud Era, Doug Cahill, Senior Analyst at ESG, is sharing his expert opinion on exactly how to do that. Make sure you tune-in and learn: - New insights into the shift to enterprises being attack targets and why - Why ransoms have increased and what the role and relevance of cybersecurity insurance is - Essential information about the threat actors themselves and how have they changed their approach to monetizing extortion - Specific best practices for ransomware cybersecurity that businesses must implement - And more
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (110)
Subscribers (6714)
Gigamon offers a deep observability pipeline that harnesses actionable network-level intelligence to amplify the power of observability tools. This powerful combination enables IT organizations to assure security and compliance governance, speed root-cause analysis of performance bottlenecks, and lower operational overhead associated with managing hybrid and multi-cloud IT infrastructures.