У нас вы можете посмотреть бесплатно Episode 15 - When Ransomware Detonates: Why Recovery is the Real Target with Costas Kourmpoglou или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
In this episode of Detonation Point presented by Elastio, Matt O’Neill and Costas Kourmpoglou delve into the complexities of ransomware and organizational resilience. They discuss the evolution of ransomware tactics, the business model behind it, and the role of cryptocurrency in facilitating these attacks. The conversation highlights the importance of understanding initial access points, the cultural challenges within organizations, and the need for effective training and awareness. They also explore the implications of cyber insurance, the significance of backup strategies, and the future landscape of cybersecurity. Takeaways Ransomware has evolved into a lucrative business model. Initial access is often gained through credential reuse and social engineering. Organizational culture plays a crucial role in cybersecurity effectiveness. Training must be tailored and meaningful to be effective. Cybersecurity should be integrated into the overall business strategy. Backup strategies need to be robust and regularly tested. Dual extortion tactics are becoming more common among threat actors. Cyber insurance policies are evolving in response to ransomware threats. Organizations often struggle with the cultural aspects of cybersecurity. Resilience planning must involve all levels of the organization. Chapters 00:00 Introduction 1:25 Understanding Cyber Risk and Ransomware 05:17 Ransomware as a Business Model 07:25 The Role of Cryptocurrency in Ransomware 10:16 Cyber Insurance and Ransomware Payments 13:07 Initial Access and Vulnerabilities 15:36 Cultural Challenges in Cybersecurity 18:01 Empowering Employees in Cybersecurity 20:55 C-Suite Attitudes Towards Cybersecurity 23:14 Current Threat Vectors and Best Practices 26:33 Lateral Movement and Backup Strategies 27:24 The Evolution of Ransomware Tactics 29:15 The Dilemma of Paying Ransom 30:47 Focusing on Resilience and Business Continuity 33:08 The Importance of Reporting Breaches 34:27 Addressing Breach Fatigue 34:49 Key Strategies for Minimizing Cybersecurity Impact 37:29 The Reality of Resilience Planning 40:28 Cultural Challenges in Cybersecurity 41:47 The Future of Cybersecurity and Ransomware 44:47 Optimism in Cybersecurity Culture About Our Founding Sponsor, Elastio This podcast is proudly presented by Elastio, the control point for cyber resiliency—because survival depends on clean recoveries. As our Founding Sponsor, Elastio continuously validates backups, bridging the gap between security tools and immutable storage. With AI-driven detection and zero-day recovery, Elastio ensures data is clean, uncompromised, and always recoverable. Learn more: http://www.elastio.com