Hi [[ session.user.profile.firstName ]]

Tactics & Measures for Ransomware in Enterprise Workplace 2021

On Feb 9th. 2021 - the nightmare scenario that the security community has warned for years, one that could kill thousands by targeting the critical infrastructure that we all rely on. In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer, according to Reuters, and jacked up the levels of sodium hydroxide, aka lye, which would have made the water highly toxic to drink.

What is really happening here? What tactics and measures should you consider in the ransomware battleground for attacks like this? It is our honor to welcome Information Security Evangelist, Mr. Jeff Man, to join us and discuss this very timely topic.

- From big game hunting to cyberwar, what are the evolving tactics of recent incidents and breaches?
- State of Zero Trust practices in the real world, particularly in the public sector?
- How do you detect and stop the propagation with Zero Trust Isolation? Can Airgap Ransomware Kill Switch help?
Recorded Feb 17 2021 0 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Jeff Man, Poul Frederiksen, Syya Yasotornrat
Presentation preview: Tactics & Measures for Ransomware in Enterprise Workplace 2021

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Get Ahead of Ransomware Attacks with Threat Intelligence May 4 2021 4:00 pm UTC 30 mins
    Airgap Networks
    Organizations of all sizes can be the target of ransomware. Cyberattacks continue to be one of the biggest threats to global businesses and there is no sign of this slowing down. Attack frequency has reached unprecedented levels. The FBI does not support paying a ransom in response to a ransomware attack. So, the question is - How do you get ahead of Ransomware Attacks?

    Data intelligence drives decisions. In this solution directed talk, we will elaborate on how Airgap's Zero Trust Isolation platform:
    - Collects and utilizes cyberattack incident report flow, reputation data, endpoint telemetry, and streaming analytics
    - Exchanges security intelligence data across leading SIEM and SOAR platforms
    - Integrates with leading endpoint management for autonomous and adaptive policies from endpoint to enterprise

    Airgap's Zero Trust Isolation provides the full spectrum of data intelligence from discovery, aggregation to consolidation. Don't miss it.

    About Airgap Networks
    Ransomware threat is growing rapidly. While there are a whole bunch of security companies that are trying to prevent ransomware from getting into your network, Airgap's "Zero Trust Isolation Platform" protects your organization even if your perimeter is breached or if you have unpatched vulnerable servers inside your data center. Additionally, Airgap’s “Ransomware Kill Switch” is the most potent ransomware response for the IT organization. Airgap can be deployed in minutes without any agents, forklift upgrades, or design changes. The company is founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io
  • From The Source: CISA Ransomware Campaign and Zero Trust Directives May 3 2021 2:00 pm UTC 79 mins
    Amy Nicewick, Chief of Comunications Management, Cybersecurity and Infrastructure Security Agency, DHS
    The CISA Ransomware Campaign and Zero Trust Directives
    Zero trust, supply chain security, and DevSecOps. These are the three 2021 priorities for CISA Cybersecurity Framework. In this event keynote, Amy Nicewick, Chief of Communications Management at Cybersecurity and Infrastructure Security Agency will highlight the recent CISA Ransomware campaign to reduce the attack blast radius of ransomware and how zero trust plays in the Cybersecurity framework for Federal Government Continuity of Operations (COOP).

    Airgap is a proud sponsor for the CISO Roundtable event. Ransomware threat is growing rapidly. While there are a whole bunch of security companies that are trying to prevent ransomware from getting into your network, Airgap's "Zero Trust Isolation Platform" protects your organization even if your perimeter is breached or if you have unpatched vulnerable servers inside your data center. Additionally, Airgap’s “Ransomware Kill Switch” is the most potent ransomware response for the IT organization. Airgap can be deployed in minutes without any agents, forklift upgrades, or design changes. The company is founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io
  • Ransomware in Healthcare Apr 22 2021 5:00 pm UTC 30 mins
    Kris Kistler, CISO for Cognizant Healthcare
    Hackers are outpacing healthcare in the overall cybersecurity race. With the recent OT/IOT device hacks gaining access to live feeds of 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools, Zero Trust design and implementation in healthcare stands out to help stop attack proliferation. In this segment, Kris Kistler, CISO of Cognizant, will discuss how Zero Trust transformation as a journey for healthcare facilities and share the view to defend device cybersecurity.
  • From The Source: CISA Ransomware Campaign and Zero Trust Directives Apr 20 2021 8:00 pm UTC 30 mins
    Amy Nicewick, Chief of Comunications Management, Cybersecurity and Infrastructure Security Agency, DHS
    The CISA Ransomware Campaign and Zero Trust Directives
    Zero trust, supply chain security, and DevSecOps. These are the three 2021 priorities for CISA Cybersecurity Framework. In this event keynote, Amy Nicewick, Chief of Communications Management at Cybersecurity and Infrastructure Security Agency will highlight the recent CISA Ransomware campaign to reduce the attack blast radius of ransomware and how zero trust plays in the Cybersecurity framework for Federal Government Continuity of Operations (COOP).

    Airgap is a proud sponsor for the CISO Roundtable event. Ransomware threat is growing rapidly. While there are a whole bunch of security companies that are trying to prevent ransomware from getting into your network, Airgap's "Zero Trust Isolation Platform" protects your organization even if your perimeter is breached or if you have unpatched vulnerable servers inside your data center. Additionally, Airgap’s “Ransomware Kill Switch” is the most potent ransomware response for the IT organization. Airgap can be deployed in minutes without any agents, forklift upgrades, or design changes. The company is founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io
  • From The Source: CISA Ransomware Campaign and Zero Trust Directives Recorded: Apr 19 2021 80 mins
    Amy Nicewick, Chief of Comunications Management, Cybersecurity and Infrastructure Security Agency, DHS
    The CISA Ransomware Campaign and Zero Trust Directives
    Zero trust, supply chain security, and DevSecOps. These are the three 2021 priorities for CISA Cybersecurity Framework. In this event keynote, Amy Nicewick, Chief of Communications Management at Cybersecurity and Infrastructure Security Agency will highlight the recent CISA Ransomware campaign to reduce the attack blast radius of ransomware and how zero trust plays in the Cybersecurity framework for Federal Government Continuity of Operations (COOP).

    Airgap is a proud sponsor for the CISO Roundtable event. Ransomware threat is growing rapidly. While there are a whole bunch of security companies that are trying to prevent ransomware from getting into your network, Airgap's "Zero Trust Isolation Platform" protects your organization even if your perimeter is breached or if you have unpatched vulnerable servers inside your data center. Additionally, Airgap’s “Ransomware Kill Switch” is the most potent ransomware response for the IT organization. Airgap can be deployed in minutes without any agents, forklift upgrades, or design changes. The company is founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io
  • Ransomware Battleground: From APT 69420 to Device Cybersecurity Recorded: Apr 16 2021 30 mins
    Syya Yasotornrat
    Tesla, Cloudflare, Halifax Health, and Equinox are among the victims involved in a breach of more than 150,000 Verdaka's security cameras by a group of hackers known as Advanced Persistent Threat 69420 Arson Cats. The hackers used a "super admin account," which allowed them to peer into the cameras of all of Verdaka's customers. The group found the user name and password for the administrator account publicly exposed on the internet. (Source:https://www.foxbusiness.com/technology/hacker-group-breaches-security-cameras-at-tesla-equinox-cloudfare)

    Are there reasons to believe that an incident involving office security cameras can impact your customers? How do you defend Device Cybersecurity?

    In this Battleground, we will dig into the cybersecurity implication of unmanaged devices in organizations and how zero trust isolation policies can be put in practice to prevent lateral threats from propagating in the network.
  • Ransomware in Education: The Changing Landscape in Cybersecurity and Privacy Recorded: Apr 7 2021 16 mins
    James Mountain and Chuck Harrod
    Spiking ransomware attacks against schools make pandemic education even harder. As schools planning for Recovery 2021 and back to school in full capacity, we are excited to share the use case of IT practices at the Palmer College of Chiropractic and their journey of DIY Zero Trust Isolation. You will learn:
    - Lesson learned on must-have design principles for homegrown Zero Trust Isolation
    - Maintain security hygiene as devices from remote learning coming back to in-person classroom setting
    - Defend device cybersecurity in healthcare facilities for managed and unmanaged devices (OT/IOT)
    - Deploy Identity based segmentation and ringfencing in a distributed remote & branch campus settings
    - Ransomware Kill Switch use cases: How do you reduce the ransomware attack blast radius when the 10% happens?
  • Exploring The Long-Term Ramifications of the SolarWinds Attack Recorded: Apr 3 2021 54 mins
    Ritesh Agrawal, CEO, Airgap Networks and CISO Panel - HMG
    The recent SolarWinds cyber-attack is believed to be the most damaging hack of a Western government ever, not to mention the impact on more than 425 companies in the Fortune 500 who receive services from SolarWinds. While the immediate dangers have been identified, several HMG insiders say it will likely take months if not years for the cumulative risks to unfold.

    IN THIS EXCLUSIVE ON-DEMAND EVENT, YOU’LL DISCOVER:

    — Valuable perspectives on the specific risks to sensitive corporate and personal data that are inherent in the SolarWinds breach.

    — Rich insights from cybersecurity leaders on the long-range impact to third-party risk and supply-chain vulnerability assessments.

    — Unique counsel on both the short and long-term implications of the breach for organizations and recommendations for CISOs and security leaders on the next steps they need to be taking.
  • Big Game Hunting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers Recorded: Apr 2 2021 35 mins
    Kurtis Minder and Syya Yasotornrat
    Big Game Hunting, the targeted large-scale ransomware campaign, is now regarded as the primary cyber threat to organizations across all sectors including financial, healthcare, and government in 2021. Leaking stolen data in an effort to pressure victims into paying is part of a broader trend across the BGH ecosystem. In the recent headlines, the ransomware operators go beyond the traditional dominance of Windows operating systems and now target VMware ESXi hypervisor. In this Ransomware Battleground, let’s look at how SPRITE SPIDER(Defray777 Ransomware) and CARBON SPIDER (Parkside Ransomware) operate in volume tactics. How do Cybercrime actors now back to use Linux variants of ransomware configured specifically to affect ESXi hosts?

    In this talk, we will cover:
    - What are Big Game Hunting tactics? And what did ransomware operator behavior change during Covid-19? (from POS to ESXi)
    - How do you defend encrypting virtual infrastructure in your corporate network? Credential harvesting and payload ingesting?
    - Why is Agentless Zero Trust Isolation and Ransomware Kill Switch the answer to stop Hypervisor "Jackpotting"?
  • Ransomware in Education: The Changing Landscape in Cybersecurity and Privacy Recorded: Mar 31 2021 17 mins
    James Mountain and Chuck Harrod
    Spiking ransomware attacks against schools make pandemic education even harder. As schools planning for Recovery 2021 and back to school in full capacity, we are excited to share the use case of IT practices at the Palmer College of Chiropractic and their journey of DIY Zero Trust Isolation. You will learn:
    - Lesson learned on must-have design principles for homegrown Zero Trust Isolation
    - Maintain security hygiene as devices from remote learning coming back to in-person classroom setting
    - Defend device cybersecurity in healthcare facilities for managed and unmanaged devices (OT/IOT)
    - Deploy Identity based segmentation and ringfencing in a distributed remote & branch campus settings
    - Ransomware Kill Switch use cases: How do you reduce the ransomware attack blast radius when the 10% happens?
  • Ransomware Stops Here: Ransomware Kill Switch Use Cases Recorded: Mar 30 2021 41 mins
    Shad Gunderson
    In the ransomware battleground, time is of the essence. Gaining full understanding of the threat and malware behavior is becoming increasingly challenging with cyber adversaries blurring the lines between the types of attacks used to target organizations. In this webcast, the security operation experts will share how they use Ransomware Kill Switch to stop the propagation against the myriad of threats to your data and operations instantly. Join us to know what Ransomware Kill Switch is and understand how to set policies for defend against what your adversaries are after? And How do you use Airgap's Ransomware Kill Switch to defend your enterprise?
  • Stop Ransomware for Good: Extending Zero Trust from Endpoint to Enterprise Recorded: Mar 29 2021 25 mins
    Ritesh Agrawal
    Nearly 70% of the ransomware attacks start from the compromise of a single endpoint followed by lateral movement. This is what turns an attack on a single endpoint into a huge breach. In this talk, Ritesh Agrawal, CEO and Founder of Airgap Networks, will discuss how ransomware cripples your organization and various mitigation techniques to help better protect your organization against the ransomware menace. This session will cover some of the following topics:

    Ransomware propagation protection via Zero Trust Isolation (Identity-based segmentation)
    Instant remediation via Ransomware Kill Switch
  • Exploring The Long-Term Ramifications of the SolarWinds Attack Recorded: Mar 28 2021 55 mins
    Ritesh Agrawal, CEO, Airgap Networks and CISO Panel - HMG
    The recent SolarWinds cyber-attack is believed to be the most damaging hack of a Western government ever, not to mention the impact on more than 425 companies in the Fortune 500 who receive services from SolarWinds. While the immediate dangers have been identified, several HMG insiders say it will likely take months if not years for the cumulative risks to unfold.

    IN THIS EXCLUSIVE ON-DEMAND EVENT, YOU’LL DISCOVER:

    — Valuable perspectives on the specific risks to sensitive corporate and personal data that are inherent in the SolarWinds breach.

    — Rich insights from cybersecurity leaders on the long-range impact to third-party risk and supply-chain vulnerability assessments.

    — Unique counsel on both the short and long-term implications of the breach for organizations and recommendations for CISOs and security leaders on the next steps they need to be taking.
  • Ransomware Battleground: Ransom DDoS Attacks Recorded: Mar 25 2021 34 mins
    Andrew Sanford, Poul Frederiksen and Syya Yasotornrat
    In this episode of Ransomware Battleground, we will be talking about Ransom DDoS attacks. Unlike a ransomware attack, a DDoS Ransom attack does not encrypt a company's systems; it mainly aims to stress and halt them offline. It also does not require the attacker to gain access to a business's internal systems before it can be carried out. So, how would a zero trust isolation solution work to stop this type of attacks. We will discuss:

    What is a ransom DDoS attack?
    What is a DDoS attack?
    How does a ransom DDoS attack work?
    What is the difference between a ransom DDoS attack and ransomware?
    How you can stop the attacks with identity-based segmentation and Zero Trust Isolation?

    Don’s miss it!
  • Big Game Hunting: CARBON SPIDER and SPRITE SPIDER Target ESXi Servers Recorded: Mar 19 2021 36 mins
    Kurtis Minder and Syya Yasotornrat
    Big Game Hunting, the targeted large-scale ransomware campaign, is now regarded as the primary cyber threat to organizations across all sectors including financial, healthcare, and government in 2021. Leaking stolen data in an effort to pressure victims into paying is part of a broader trend across the BGH ecosystem. In the recent headlines, the ransomware operators go beyond the traditional dominance of Windows operating systems and now target VMware ESXi hypervisor. In this Ransomware Battleground, let’s look at how SPRITE SPIDER(Defray777 Ransomware) and CARBON SPIDER (Parkside Ransomware) operate in volume tactics. How do Cybercrime actors now back to use Linux variants of ransomware configured specifically to affect ESXi hosts?

    In this talk, we will cover:
    - What are Big Game Hunting tactics? And what did ransomware operator behavior change during Covid-19? (from POS to ESXi)
    - How do you defend encrypting virtual infrastructure in your corporate network? Credential harvesting and payload ingesting?
    - Why is Agentless Zero Trust Isolation and Ransomware Kill Switch the answer to stop Hypervisor "Jackpotting"?
  • Stop Ransomware for Good: Extending Zero Trust from Endpoint to Enterprise Recorded: Mar 15 2021 26 mins
    Ritesh Agrawal
    Nearly 70% of the ransomware attacks start from the compromise of a single endpoint followed by lateral movement. This is what turns an attack on a single endpoint into a huge breach. In this talk, Ritesh Agrawal, CEO and Founder of Airgap Networks, will discuss how ransomware cripples your organization and various mitigation techniques to help better protect your organization against the ransomware menace. This session will cover some of the following topics:

    Ransomware propagation protection via Zero Trust Isolation (Identity-based segmentation)
    Instant remediation via Ransomware Kill Switch
  • Tactics & Measures for Ransomware in Enterprise Workplace 2021 Recorded: Mar 5 2021 47 mins
    Jeff Man, Poul Frederiksen, Syya Yasotornrat
    On Feb 9th. 2021 - the nightmare scenario that the security community has warned for years, one that could kill thousands by targeting the critical infrastructure that we all rely on. In this case, the hacker gained access to a computer at the Florida water facility used for running remote control software TeamViewer, according to Reuters, and jacked up the levels of sodium hydroxide, aka lye, which would have made the water highly toxic to drink.

    What is really happening here? What tactics and measures should you consider in the ransomware battleground for attacks like this? It is our honor to welcome Information Security Evangelist, Mr. Jeff Man, to join us and discuss this very timely topic.

    - From big game hunting to cyberwar, what are the evolving tactics of recent incidents and breaches?
    - State of Zero Trust practices in the real world, particularly in the public sector?
    - How do you detect and stop the propagation with Zero Trust Isolation? Can Airgap Ransomware Kill Switch help?
  • Responding to Ransomware for Midsize Enterprises with NIST Recorded: Mar 4 2021 48 mins
    Robert Hodges and Alissa Valentina Knight
    The National Cybersecurity Center of Excellence (NCCoE) recently released the draft NIST Cybersecurity Practice Guide SP 1800-26, Detecting and Responding to Ransomware and Other Destructive Events. How do you in mid-enterprise prepare, react, or recover from ransomware attacks? Understand your state of compromise with NIST guidelines. Check your exposure to ransomware attacks & get intel to prioritize and contain the propagation fast. Join this talk with NIST Cybersecurity Expert on how Zero Trust Security matters for Mid-Enterprises.
  • Ransomware Stops Here: Ransomware Kill Switch Use Cases Recorded: Mar 3 2021 41 mins
    Shad Gunderson
    In the ransomware battleground, time is of the essence. Gaining full understanding of the threat and malware behavior is becoming increasingly challenging with cyber adversaries blurring the lines between the types of attacks used to target organizations. In this webcast, the security operation experts will share how they use Ransomware Kill Switch to stop the propagation against the myriad of threats to your data and operations instantly. Join us to know what Ransomware Kill Switch is and understand how to set policies for defend against what your adversaries are after? And How do you use Airgap's Ransomware Kill Switch to defend your enterprise?
  • Ransomware Stops Here: Ransomware Kill Switch Use Cases Recorded: Feb 24 2021 42 mins
    Shad Gunderson
    In the ransomware battleground, time is of the essence. Gaining full understanding of the threat and malware behavior is becoming increasingly challenging with cyber adversaries blurring the lines between the types of attacks used to target organizations. In this webcast, the security operation experts will share how they use Ransomware Kill Switch to stop the propagation against the myriad of threats to your data and operations instantly. Join us to know what Ransomware Kill Switch is and understand how to set policies for defend against what your adversaries are after? And How do you use Airgap's Ransomware Kill Switch to defend your enterprise?
The Best Defense Against Ransomware Propagation
Ransomware attacks and threats are growing exponentially. While many security companies are trying to prevent ransomware from breaching the perimeter of your network, Airgap's Zero Trust Isolation Platform protects your organization from the inside out. Additionally, Airgap’s Ransomware Kill Switch is the most potent ransomware response for an IT organization. The solution can be deployed in minutes without any endpoint agents, forklift upgrades, or design changes. Airgap was founded by highly experienced cybersecurity experts and the solution is trusted by large enterprises and service providers. For more details, check out https://airgap.io or email media@airgap.io

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Tactics & Measures for Ransomware in Enterprise Workplace 2021
  • Live at: Feb 17 2021 9:00 pm
  • Presented by: Jeff Man, Poul Frederiksen, Syya Yasotornrat
  • From:
Your email has been sent.
or close