The Future State of Ransomware is Closer Than We Think

Presented by

Rick McElroy, Principal Cyber Security Strategist at VMware, & Scott Scheferman, Principal Strategist at Eclypsium

About this talk

Digital extortionists have learned how to continue to up the stakes by multiplying their leverage and reducing the time window of negotiation. Join Rick McElroy, Principal Cyber Security Strategist at VMware Carbon Black, and Scott Scheferman, Office of the CTO at Eclypsium as we explore where they are headed, and ask the hard questions about what it will take to get ahead of them. We will discuss: - What is the future of digital extortion campaigns? - What is the nature and magnitude of impacts associated with these? - Where and how does firmware and device trust come into play here? - How do organizations that have fully migrated to 3rd party cloud infrastructure and SaaS services, proactively mitigate risks in this new future? - What can present-day research and attacker campaigns teach us about what is next to come? - What is the next ‘North Star’ for us to aspire to? Is it still Zero Trust? Together, Rick and Scott bring a combined 50 years of industry experience - the majority of which has been spent on the front lines of military, commercial, education, and federal spaces. They will harness a discussion that aims to “call it like they see it”, discern whether we are on the right path, and ask the hard questions about what it will take for us to get there, collectively, as an industry that might be in dire need of a wake-up call as we head into this great unknown together. One thing is for certain; if we don’t anticipate and prepare for the future, we will surely succumb to its folly.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (50)
Subscribers (3224)
Eclypsium is the industry’s leading enterprise firmware protection platform - providing a new layer of security to protect your IT infrastructure from firmware attacks. Eclypsium defends enterprises and government agencies from vulnerabilities and threats hidden within firmware that are invisible to most organizations today.