[Ep.2] The Rise of Ransomware: Planning for When, Not If

Logo
Presented by

Doug Cahill - Senior Analyst, ESG and Bassam Khan - VP of Product and Technical Marketing Engineering at Gigamon

About this talk

Think your backups are a panacea for ransomware defense? Think again. Traditional backups are no longer enough and despite ransomware being a popular business model for cybercriminals for years, it’s gaining relevance with supply chain attacks, and big game hunting - attacks on enterprises - are increasing. Graff, JBS, Colonial Pipeline and software manager Kaseya are just some of the businesses held to ransom recently. With Colonial paying $4.4 million and JBS $11 million, it’s more essential than ever that CISOs are clued up on the latest in threat intelligence as enterprise ransomware attacks become more targeted and less ‘spray and pray’. This rise of ransomware is coupled with the shift from remote to hybrid working, which has seen the number of remote endpoints and intruder attack space both increasing exponentially. It’s the perfect storm, and organizations must know how to effectively battle ransomware by planning ahead and preparing for the inevitable. In episode 2 of Revisiting Threat Models in the Cloud Era, Doug Cahill, Senior Analyst at ESG, is sharing his expert opinion on exactly how to do that. Make sure you tune-in and learn: - New insights into the shift to enterprises being attack targets and why - Why ransoms have increased and what the role and relevance of cybersecurity insurance is - Essential information about the threat actors themselves and how have they changed their approach to monetizing extortion - Specific best practices for ransomware cybersecurity that businesses must implement - And more

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (100)
Subscribers (2938)
Gigamon is the first company to deliver unified network visibility and analytics on all information-in-motion, from raw packets to apps, across physical, virtual and cloud infrastructure. We aggregate, transform and analyse network traffic to solve for critical performance and security needs, including rapid threat detection and response, freeing your organization to drive digital innovation.