Ransomware from ATT&CK to Zcash: Preparation and Proposed Solutions / Disaster Recovery and Creative Methods of Recovery
Sponsor Spotlight: Dell Technologies
Speaker: Dave Binkunski Session 1: Ransomware from ATT&CK to Zcash: Preparation and Proposed Solutions Speaker: Harry Halikias Sr. Manager, Privacy & Security Abstract: Ransomware is a modern-day form of piracy and extortion in which computer files are the prized loot and companies or societies are the victims. It is an old human nature problem executed at internet speed, which does not require the moral decision of what to do with the hostage. However, that does not make it a victimless crime. There are countless stories of companies going out of business because they cannot pay. Boardrooms, the C-suite, business owners, information security departments, and policymakers also struggle with the complexities of an issue that seems easy (just restore from backups) but is far more complicated. The fact is that a major ransomware incident will test every aspect of an organization, from Information Technology to legal, finance, marketing, and even the cafeteria. The research this presentation is based on demonstrates how all organizations are at risk of a catastrophic incident. Ransomware is examined from every angle, from perceptions to technology, legal issues, policy-making challenges, and the high-octane fuel that is cyber insurance. It reviews how ransomware impacts various industries before answering the questions of “should you pay?”. The research then examines the complexities of response and recovery. Finally, it proposes solutions to end the ransomware problem. The presentation will review findings from the research and give the ISC2 LI community a chance to propose solutions to the problem. Speaker Bio: Harry Halikias has over 15 years in IT with a focus on security and privacy over the last few years. He is also a recent graduate of the Master of Cybersecurity program at Brown University where his research focused on ransomware Session 2: Disaster Recovery and Creative Methods of Recovery Speakers: Michael DePalma Senior Channel Development Manager, Datto, Inc. Ed Eisenstein CEO / Founder, United Network Associates Abstract: As we move forward into 2021, our reliance on our IT infrastructure continues to grow. Unfortunately, cyber criminals are seizing on this growth. In order to combat these threats, your processes shouldn’t solely be focused on how secure your business is, but rather how cyber resilient it is. Indeed, security is paramount, but if you do fall victim to an attack, the speed in which you can detect an attack and get your systems back into a true production environment is crucial in turning an attack into an inconvenience as opposed to a business threatening event.Speaker Bios: Michael DePalma Michael graduated Johns Hopkins University in 2002 with a degree in Political Science. Upon graduation, he began a career in sales which has covered a wide range of industries, from banking to construction management to eventually technology. Michael represents Datto at numerous trade shows and technology conferences throughout North America, frequently presenting alongside members of the Department of Homeland Security and the FBI. The objective of these presentations is to connect with business owners and IT professionals to educate them on current cyber threats and the role business continuity plays in combatting these threats. Twitter: @michael_depalma Linkedin: www.linkedin.com/in/michaeldepalma1/ Ed Eisenstein 30 years in IT enterprise management, eight as Commissioner of IT for Nassau County (2010 to 2018), where he achieved significant operational improvements in governmental organization. At UNA he manages IT systems as a Fractional CIO with expertise in strategic road mapping and execution.
|