Defending from Crypto-Jacking, Ransomware & Worming Malware's Frightening Future

Presented by

Jay Beale, Co-founder, COO & CTO, InGuardians

About this talk

In the last six months, crypto-mining malware and crypto-jacking have taken center stage in cybercrime news. We’ll discuss the most recent events and see how this links to ransomware, which dominated the cybercrime news last year, where one outbreak cost seven companies over one billion dollars. Both crypto-mining malware and ransomware, aside from gathering headlines, demonstrate that cybercriminals and nation state actors are building capabilities for worming malware that could have the ability to do far greater damage than has yet been seen. Come to this talk, learn what’s been going on, where it’s likely going, and how to avoid being a victim of a headline-generating event. About the Speaker: Jay Beale created two tools used by hundreds of thousands of individuals, companies and governments, Bastille Linux and the Center for Internet Security’s first Linux/UNIX scoring tool. He has led training classes on Linux security at the Black Hat, CanSecWest, RSA, and IDG conferences, as well as in private corporate training, since 2000. As an author, series editor and speaker, Jay has contributed to nine books and two columns and given more than one hundred public talks. He led the development of the Linux security standard for the Center for Internet Security, served on the board of Mitre’s OVAL project, and serves as a member on the O’Reilly Security Conference’s program committee. He is a co-founder, COO and CTO of the information security consulting company InGuardians, a leading information security consultancy with offices in Seattle, Boston, Chicago, Dallas, Atlanta and Washington, DC.

Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (3449)
Subscribers (176789)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.