Ransomware attacks continue to make headlines, and for good reason: on average, there is a new ransomware attack every 11 seconds, and the losses to organisations from ransomware attacks is projected to reach $20 billion over the course of 2021
Sam Curry revisits ransomware research and insights delivered by Cybereason's Nocturnus and incident response teams. You'll hear the team explore insights based upon what is happening in the underground and first hand experience from what customers have encountered in the wild.
Get a snapshot of the current state of ransomware, some highlights include:
Ransomware continues to evolve and despite what many in the industry had thought was a lull in the use of ransomware by cyber criminals; it hasn’t gone away and has returned with a vengeance. The “tried and true” source of revenue saw an increase of 225% in 2020 for cyber criminals. It now comes with capabilities and new tactics to ensure money is paid by the victims it has been inflicted upon.
Sam Curry has over 25 years of IT security industry experience and is a Visiting Fellow at the National Security Institute. Sam most recently served as CTO, CSO and GM at Arbor Networks. Previously, he spent more than seven years at RSA (the Security Division of EMC) in a variety of senior management roles, including CTO, SVP of Product and Head of RSA Labs. In addition to other media. Sam has also held senior management roles at Microstrategy, Computer Associates, and McAfee in addition to co-founder and first employee of two successful security startups.
Mor Levi has over 8 years of experience in cyber investigations, incident response, and SIEM/SOC management. She began her career as a team leader in the Israeli Defense Force security operation center. Later, she led an incident response and forensics team at one of the big four accounting firms providing services to global organizations.
Assaf is a renowned security researcher, with over 15 years of experience in the InfoSec industry. He started his career in the Israeli Military 8200 unit where he acquired extensive experience in offensive security and intelligence work. Later in his career he led red-teams, developed penetration testing methodologies, and specialized in malware analysis and reverse engineering.