How are you dealing with the continued prevalence of ransomware attacks?


2.7k views4 Upvotes5 Comments

Founder/Chairman/CTO in Telecommunication, 201 - 500 employees
The risk assumption that I operate on is that things are broken, you just don't know how. So how do you plan defense responses, and even detection and mitigation that is reflective of that fact. You won’t be able to solve everything, but how do you make sure your fence is built tall enough from a discovery and prevention standpoint? And how do you operate on the assumption that you're going to get breached? That stuff will happen, so you have to plan ahead. It’s dark, but it feels more resilient.

I saw this incredible write up from one of the Log4j maintainers on what it's like to be someone who's been volunteering their time to support code that powers half the internet, and then get yelled at all at once by everyone on the internet. It sucks when you think it through, of course. That's terrible. But for some reason, we're not planning ahead for that type of thing. And assuming that there will be swings and roundabouts that are uncomfortable for us to deal with, we need to try to ring-fence however we can. 
1 Reply
VP, Director of Cyber Incident Response in Finance (non-banking), 10,001+ employees

I've been part of an open source group maintaining software before, and I don't think I ever thought about what the impact would be if somebody found a vulnerability in the code I produced. I can't imagine the vitriol the Log4j maintainers must have faced from all corners. It has to be hard for them as people who thought they were just doing good for the community.

SVP in Finance (non-banking), 1,001 - 5,000 employees
You have to build resiliency. That's the conversation: you have to make sure there's a resiliency plan in place as you're designing new architectures, or deploying new technologies. Oftentimes the ransom has to be paid just to ensure the attackers do not disclose data. If they’re recoverable, the company can recover from their backups and be fully operational. But even if there is no major impact in terms of operations, the business still has to pay the ransom because of the potential consequences of a data leak.
Network & Security Section Head in Telecommunication, 1,001 - 5,000 employees
We started implementing Zero Trust approach.
Chief Information Officer in Manufacturing, 10,001+ employees
We have a Strategy in place to implement Zero Trust and are partnering with multiple 3rd party partners to support our Strategic Security Program. 

Content you might like

Yes65%

No, but I expect that may change.27%

No, and I don’t expect that to change.7%

Other (please specify)0%


322 PARTICIPANTS

907 views

CTO in Software, 201 - 500 employees
Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.
Read More Comments
46.6k views133 Upvotes324 Comments

Data breaches due to remote work19%

Ransomware attacks43%

Lack of a corporate security plan21%

Missing security patches8%

Failure to inform employees of threats3%

Other (please specify)3%


350 PARTICIPANTS

849 views1 Comment