Artwork

Content provided by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The History of Ransomware: From Malware-Ridden Floppy Disks to "Trusted" Cyber Gang Tycoons

20:33
 
Share
 

Manage episode 335761218 series 3376008
Content provided by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Chief Security Officer Phil Richards rejoins Chris Goettl, Head of Endpoint Security Product Management, for a history lesson of ransomware attacks: starting with its origins on malware-riddled floppy disks and ending with predictions of where ransomware gangs will go after several recent -- and highly publicized -- ransoms.
Today's talk covers:

  • The start of ransomware as malware hidden in floppy disks containing AIDS education materials that required victim users to mail paper checks as ransom to Panama
  • The recent explosion in value of ransomware extortions from a few thousand USD and four days down time... to $4.1 million USD ransoms of the Colonial Pipeline and weeks or months of time to restoration.
  • Why the ransomware business model requires users to trust the criminal actors (as odd as that seems!)
  • How ransomware gangs are expected to adapt to modern cybersecurity defenses, requiring security teams to implement multiple tactics to prevent successful ransom attempts and interruption to business operations
  • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
  continue reading

50 episodes

Artwork
iconShare
 
Manage episode 335761218 series 3376008
Content provided by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Chief Security Officer Phil Richards rejoins Chris Goettl, Head of Endpoint Security Product Management, for a history lesson of ransomware attacks: starting with its origins on malware-riddled floppy disks and ending with predictions of where ransomware gangs will go after several recent -- and highly publicized -- ransoms.
Today's talk covers:

  • The start of ransomware as malware hidden in floppy disks containing AIDS education materials that required victim users to mail paper checks as ransom to Panama
  • The recent explosion in value of ransomware extortions from a few thousand USD and four days down time... to $4.1 million USD ransoms of the Colonial Pipeline and weeks or months of time to restoration.
  • Why the ransomware business model requires users to trust the criminal actors (as odd as that seems!)
  • How ransomware gangs are expected to adapt to modern cybersecurity defenses, requiring security teams to implement multiple tactics to prevent successful ransom attempts and interruption to business operations
  • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
  continue reading

50 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play