Following in the footsteps of a cyber-criminal and uncovering their digital footprint. This is a journey inside the mind of an ethical hacker’s response to a ransomware incident that brought a business to a full stop, and discovering the evidence left behind to uncover their attack path and the techniques used. Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access sensitive information. This session will show you the attacker’s techniques used and how they went from zero to full domain admin compromise that resulted in a nasty CryLock ransomware incident.In this session Joseph Carson will cover a real-world incident response to the CryLock ransomware showing the techniques used by the attackers. The footprints left behind and uncovering the techniques used.
Key Takeaways
2021 has been the year of various cyberattacks with attackers employing novel means and achieving widespread impact. Join Ax Sharma, Security Researcher and Advocate at Sonatype to learn about some relevant security FinTech incidents, ransomware and supply-chain attacks, and what can organizations do about them.
This session covers:
- Investigating 5 points of importance
- The importance of resiliency
- The importance of velocity
- The importance of cost to maturity
- The importance of risk
- The importance of security
- Realizing that technology is not on that list and why
- Being able to speak with Engineers, Regulators, Lawyers and Clients without missing a beat
- Evolving from a waterfall to an agile mindset