<img src="https://certify.alexametrics.com/atrk.gif?account=8w5fq1Fx9f207i" style="display:none" height="1" width="1" alt="">
Government Takedown of Ransomware Rings - What CISOs Need To Know
Government Takedown of Ransomware Rings - What CISOs Need To Know

Sponsored By:

Techstrong_Logo_Techyellow-3
On Demand

Anytime

Recent collaborative actions by U.S. and international law enforcement against ransomware rings such as LockBit, BlackCat, and Ragnar Locker serve as a critical wake-up call for CISOs and security leaders. These operations highlight ransomware’s sophistication and pervasive nature, emphasizing the need for robust incident response measures that may involve law enforcement.

Key Takeaways for CISOs and Security Leaders:
 
  1. Understand the Evolving Threat Landscape: With authorities stepping up their efforts against ransomware gangs, CISOs must stay informed about the latest cyber threats. The takedowns of Warezone RAT, Hive, LockBit, and others have revealed ransomware operations’ complexity and global reach, underscoring the importance of keeping abreast of cybercriminal tactics and law enforcement activities.
  2. Foster International Collaboration: The successful disruptions of ransomware networks have been significantly aided by international cooperation among law enforcement agencies. Security leaders should mirror this collaborative approach by engaging with global cybersecurity networks, sharing intelligence, and participating in collective defense initiatives.
  3. Implement Comprehensive Security Strategies: The detailed insights these takedowns provide into ransomware operations should inform your security strategies. Focus on strengthening your organization’s resilience against such attacks through advanced threat detection, regular security audits, employee training, and the implementation of robust incident response plans.
  4. Prioritize Decryption and Recovery Solutions: The distribution of decryption tools by law enforcement to aid victims of ransomware attacks underscores the importance of effective data recovery solutions. Security leaders should prioritize developing and testing decryption capabilities and disaster recovery plans to minimize downtime and data loss in the event of an attack.
  5. Engage in Proactive Defense Measures: With the increasing efficacy of law enforcement in tackling ransomware, cybercriminals may diversify their tactics. Security leaders must adopt a proactive stance, leveraging threat intelligence, employing advanced cybersecurity technologies, and continuously evaluating the security posture of their organizations.
  6. Live Audience Participation - A Call to Action: This roundtable emphasizes the critical need for security professionals to participate actively in broader discussions on cybersecurity challenges and solutions. Engaging with peers, law enforcement, and cybersecurity experts through forums and discussions can provide deeper insights and foster a collective cybersecurity awareness and action culture.

Register Below:

After registration, we'll send you an email confirmation and calendar invite 

Caroline Wong-2

Caroline Wong

Chief Strategy Officer - Cobalt
Caroline Wong is the Chief Strategy Officer at Cobalt. She has 15+ years of cybersecurity leadership, including practitioner, product, and consulting roles. Caroline authored the popular textbook, Security Metrics: A Beginner's Guide. She teaches cybersecurity courses on LinkedIn Learning and hosts the Humans of InfoSec podcast.
Jennifer Minella-modified

Jennifer Minella

Fround, Principal Advisor - Viszen Security
Author, speaker, and 20-year tech veteran, Jennifer (JJ) Minella has been helping security-conscious organizations solve infosec challenges in meaningful ways. Combining master level network architecture skills with CISO and compliance experience, she continues this mission as Founder and Principal Advisor of Viszen Security and faculty with IANS Research. 
Jennifer (JJ) has served as a technical advisor to some of the world's largest companies including several of the top 50 Fortune and Global ranked, plus dozens of household names in financial, healthcare, hospitality, manufacturing, utilities, and public sector. 
As part of her community efforts, she's served as a board member and chairperson of ISC2, and led numerous efforts in cybersecurity including with the CSA Zero Trust Working Group, RSA Conference Program Committee, InfraGard, and industry-specific task forces including biomedical security and OT/ICS security.
Mitch Ashley-Nov-06-2023-07-47-05-3785-PM

Mitch Ashley

CTO, Techstrong Group
Principal - Techstrong Research
Mitchell Ashley is a renowned strategist and technology executive. Mitchell has led successful IT, SaaS, and cybersecurity transformations. He’s led multiple teams in developing and bringing to market successful online services, cybersecurity, and networking products and services. Mitch serves as Principal of Techstrong Research where he leads a team of preeminent experts in digital transformation, DevOps, cloud-native, and cybersecurity. In this role, Mitch works with companies to align digital transformation and technology strategies to achieve disruptive goals and high impact results. Mitch is in high demand as a speaker at conferences the world over, and his popular DevOps Chats podcast engaging with digital leaders is one of the most widely followed in the field
Jennifer Minella

Jennifer Minella

Founder, Principal Advisor - Viszen Security

Author, speaker, and 20-year tech veteran, Jennifer (JJ) Minella has been helping security-conscious organizations solve infosec challenges in meaningful ways. Combining master level network architecture skills with CISO and compliance experience, she continues this mission as Founder and Principal Advisor of Viszen Security and faculty with IANS Research. 
Jennifer (JJ) has served as a technical advisor to some of the world's largest companies including several of the top 50 Fortune and Global ranked, plus dozens of household names in financial, healthcare, hospitality, manufacturing, utilities, and public sector. 
As part of her community efforts, she's served as a board member and chairperson of ISC2, and led numerous efforts in cybersecurity including with the CSA Zero Trust Working Group, RSA Conference Program Committee, InfraGard, and industry-specific task forces including biomedical security and OT/ICS security.