Ask me Anything about Ransomware

Presented by

Menachem Shafran | Zur Ulianizky | Paul Giorgi | Shay Siksik

About this talk

Ransomware groups are looking for ways to reach your critical assets, to increase their chances of getting a higher ransom payout. For the same reason, they have begun employing the double extortion technique, where before encrypting your data, they exfiltrate it and then threaten to leak it online. Searching for routes to reach your critical assets, attackers are lying low, propagating the network as a result of misconfigurations, unpatched vulnerabilities and mismanaged credentials. You probably have some questions. Join our open-ended Q&A session, where a forum of experts will relieve any doubts and answer all your questions. Here are some examples to get you started: Are there emerging techniques of ransomware that make use of other techniques besides encryption? Do we still call it ransomware if a valuable cloud resource is held for ransom? How should an organization simulate a ransomware attack? From the attacker’s perspective, what is ransomware behind the scenes? What are the differences between the ransomware of 2019 to the ransomware of 2021, and how do you envision the ransomware attacks in 2022 and beyond?

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (15)
Subscribers (486)
XM Cyber brings innovation to the security industry with patented products that address the unique gaps that arise in large, complex networks. By safely and continuously simulating attacks, XM Cyber exposes real-life security issues that arise from vulnerabilities, human error and misconfigurations. Remediation recommendations are prioritized based on criticality and relation to the customer’s most critical assets. The customer achieves a continual cycle of security posture improvement, optimizing security investments and human resources, and lowering exposure and risk. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in the US, UK, and Israel. For more information, go to xmcyber.com.