Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Nextron Systems GmbH
Forums it-sa Expo Knowledge Forum E

From Malware to Sophisticated Cyber Operations: The Evolution of Ransomware

Tracing ransomware's evolution from simple malware to complex RaaS operations, emphasizing organizational resilience measures and post-incid

calendar_today Wed, 11.10.2023, 13:00 - 13:30

event_available On site

place Forum, Booth 9-103

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Data security / DLP / Know-how protection Endpoint Protection Mobile Security Network Security / Patch Management SIEM / Threat Analytics / SOC

Key Facts

  • Evolution: From basic malware to advanced cyber operations
  • Resilience: Proactivly boost defense against ransomware
  • Post-Incident: Victims face repeated attacks; Fortify fast

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

In "From Malware to Sophisticated Cyber Operations - The Evolution of Ransomware", we trace the metamorphosis of ransomware over the past decade. From its rudimentary roots, targeting single PCs with demands for prepaid cards like Paysafe, to its current incarnation as sophisticated cyber operations by adept threat actors, the transformation is striking. The emergence of cryptocurrencies hasn’t just revolutionized the mechanics of ransom payments; it has catalyzed the very nature and scale of ransomware threats.
Between 2010 and 2015, ransomware was often a straightforward menace. The modus operandi commonly involved locking down individual PCs, displaying ransom screens, and directing victims to buy Paysafe cards. Attacks were localized, disruption was mostly individualistic.
Enter the era of Ransomware-as-a-Service (RaaS) models, democratizing cybercrime. Now, even those with minimal technical backgrounds could launch attacks. Cryptocurrencies like Bitcoin further emboldened attackers by ensuring anonymity. With these digital coins, ransoms soared, sometimes touching millions.
But it's not just the evolution of the threat landscape that's worth our attention. Increasingly, the spotlight has shifted to enhancing organizational resilience against these threats. What are the 'low hanging fruits' organizations can leverage to safeguard themselves? While prevention is ideal, we need a paradigm shift in focus: from solely preventing ransomware attacks to effectively responding to them.
A significant phase, often overshadowed by the urgency of immediate response, is the aftermath of an attack. It's a grim reality that many victims of ransomware find themselves under the threat again, sometimes shortly after recovering from a previous attack. This recurrence underscores the importance of meticulous incident response and a comprehensive post-incident strategy. It's not enough to merely oust attackers; organizations need robust frameworks to ensure they don't find their way back in.
Our discussion will delve deep into these often-underexplored facets. We'll elucidate the need for proactive measures to heighten resilience, emphasize the importance of a sound incident response protocol, and underscore the necessity of fortifying post-incident defenses to prevent recurrences.
From early days of startled users finding locked screens to today’s mega-corporations grappling with multi-million-dollar demands, we'll guide attendees through ransomware's evolutionary journey. Join us as we dissect the technological, financial, and strategic shifts that have shaped this trajectory and offer insights into building a resilient future.
... read more

Language: German

Questions and Answers: No

Speaker

show more
close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.