Combating Ransomware 2.0: Beyond Backups

When:  Jun 28, 2022 from 10:00:00 AM to 11:00:00 AM (PT)
Associated with  DevSecOps

CloudBytes Webinar, sponsored by RedSeal

Ransomware isn’t new – we can track it back to attacks using floppy disks in 1989 – and like all attacks, it has evolved over time. As defenders adopted yesterday’s protections – take backups and train users – attackers respond by upping their game. The original “smash and grab” approach has moved on, leading to today’s more sophisticated and dangerous landscape, with:

  • Ransomware-as-a-Service (RaaS) where attack tools are commercialized, meaning less skilled teams can buy and use advanced weapons they could not build for themselves

  • Double Extortion where Cybercriminals don’t just lock your data where it sits – they pull out a copy, exploiting your weak, asymmetric network controls. This allows them to level two threats at you – blocking your access to your own data, but also threatening to release it publicly if you don’t pay up.

  • Cloud ransom attacks Every new tech has a new attack surface, and new exploits targeting it, and cloud is no different. Mistakes in cloud access are rife and are increasingly a target for attackers who know they need to go where the money is – today, that’s in the cloud.

Fighting Ransomware 2.0 means upgrading your defensive techniques – as the exploits evolve, so must your response. Combating both double-dip extortion demands and cloud-focused attacks requires understanding your attack surface, so you can find and fix your defensive gaps and open pathways before the bad guys use them against you. Concern about these attacks has reached the C-suite as ransoms have impacted not only brand and customer trust, but the bottom line with ever-growing financial implications.

In this webinar we will cover:

  • Why network segmentation is the essential strategic response to ransomware’s evolution 

  • Comprehensive strategies vs. single-point solutions required to counter these sophisticated attacks

  • The true impact of lateral movement within your network

  • Why an ounce of prevention is worth a pound of cure

We’ve moved from smash and grab to sophisticated heists. This requires a cyber security strategy that works harder to avoid not only someone getting in, but plan to stop lateral movement and exfiltration. Control the blast radius, and you have a fighting chance at protecting your brand, your customers and your bottom line.

Event Image
Download to Your Calendar Outlook Google