Artwork

Inhoud geleverd door Eric Sorensen. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Eric Sorensen of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.
Player FM - Podcast-app
Ga offline met de app Player FM !

Inside the Growing Complexity of Ransomware Hacking Groups

31:41
 
Delen
 

Manage episode 439416724 series 3352216
Inhoud geleverd door Eric Sorensen. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Eric Sorensen of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Send us a text

We’re back to discuss an all-too-familiar topic – ransomware.

Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resources between prevention, detection and response. Any one of those is a challenge, but managing all three is daunting, and hackers know this. But so do the good guys - one of which is our guest for today’s episode.

Listen as Jeff Krull, principal and leader of Baker Tilly’s cybersecurity practice discusses their Guide to Ransomware Prevention, as well as his thoughts on:

  • The C-suite's growing appreciation of how cyberattacks are impacting profitability, which means cybersecurity has become more than just an IT issue.
  • How more resources have made RaaS groups increasingly difficult to detect and stop.
  • Paying vs. not paying the ransom.
  • Why more cyber regulation is on the way.
  • Manufacturing's lack of redundant assets is making it a more attractive target, but also fueling action around response and recovery plans.
  • Why not everyone needs access to everything.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.

  continue reading

111 afleveringen

Artwork
iconDelen
 
Manage episode 439416724 series 3352216
Inhoud geleverd door Eric Sorensen. Alle podcastinhoud, inclusief afleveringen, afbeeldingen en podcastbeschrijvingen, wordt rechtstreeks geüpload en geleverd door Eric Sorensen of hun podcastplatformpartner. Als u denkt dat iemand uw auteursrechtelijk beschermde werk zonder uw toestemming gebruikt, kunt u het hier beschreven proces https://nl.player.fm/legal volgen.

Send us a text

We’re back to discuss an all-too-familiar topic – ransomware.

Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resources between prevention, detection and response. Any one of those is a challenge, but managing all three is daunting, and hackers know this. But so do the good guys - one of which is our guest for today’s episode.

Listen as Jeff Krull, principal and leader of Baker Tilly’s cybersecurity practice discusses their Guide to Ransomware Prevention, as well as his thoughts on:

  • The C-suite's growing appreciation of how cyberattacks are impacting profitability, which means cybersecurity has become more than just an IT issue.
  • How more resources have made RaaS groups increasingly difficult to detect and stop.
  • Paying vs. not paying the ransom.
  • Why more cyber regulation is on the way.
  • Manufacturing's lack of redundant assets is making it a more attractive target, but also fueling action around response and recovery plans.
  • Why not everyone needs access to everything.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.
To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.

  continue reading

111 afleveringen

Alle afleveringen

×
 
Loading …

Welkom op Player FM!

Player FM scant het web op podcasts van hoge kwaliteit waarvan u nu kunt genieten. Het is de beste podcast-app en werkt op Android, iPhone en internet. Aanmelden om abonnementen op verschillende apparaten te synchroniseren.

 

Korte handleiding