Subscribe
About

Are you a soft target for cyber extortion?

Kirsten Doyle
By Kirsten Doyle, ITWeb contributor.
Johannesburg, 24 May 2022
Roland Daccache, systems engineering manager, CrowdStrike META.
Roland Daccache, systems engineering manager, CrowdStrike META.

In today’s threat landscape, there are a wide variety of factors at play that make businesses of every type, and in every industry, a target for cyber crime and ransomware.

ITWeb Security Summit 2022: 31 May - 2 June

Book your seat now to get up to speed on cyber security trends, solutions and best practices. The annual gathering of cyber security decision makers and practitioners will feature experts and thought leaders from across the globe, who will share their knowledge and insights on the most critical issues facing businesses today. It will also feature a range of workshops, training courses, and much more.

For more information, and to register, go here.

They include an increased digital footprint as well as complacency, the use of traditional approaches to cyber security, relying on legacy technologies, and believing that “it won’t happen to me”.

So says, Roland Daccache, systems engineering manager at CrowdStrike META, who will be presenting on “Ransomware and cyber extortion: Are you a low-hanging fruit (and what to do about it)?”, at the ITWeb Security Summit 2022, to be held at the Sandton Convention Centre from 31 May to 2 June.

Compounding the problem is the fact that ransomware is evolving, he says. “Cyber criminals have upped their game, meaning that even backing up data in preparation for a data restore after a ransomware attack is no longer enough to prevent data loss and reputational damage to your brand.”

"...backing up data in preparation for a data restore after a ransomware attack is no longer enough..."

Roland Daccache, CrowdStrike

Daccache says securing data and intellectual property is at the core of cyber defence today, and recommends that organisations deploy a defence-in-depth strategy that follows the data trail on every endpoint, workload and digital identity.

He also advises to invest in detection and response technologies to contain any potential intrusion from transforming into a full-blown breach.

“The unfortunate truth is that like with everything cyber, there is no silver-bullet or magic pill that will dissolve the security risks of the digital world,” he adds. “Being prepared against cyber attacks, practising internal security assessments, and reframing the cyber security strategy around a resilient zero trust architecture is no longer optional.”

Delegates attending his talk will leave with an understanding of the reasons behind the significant increase in ransomware since the start of the pandemic, and will get a glimpse into the recent notorious cyber attacks of the year.

They will also discover why ransomware as a service is becoming increasingly popular and whether or not this trend is likely to continue.

Finally, he will unpack what initial access brokers are, as well as how they relate to the rise in ransomware attacks.

“We invite all attendees of the event to pass by our booth and have a conversation around how we can help them secure their digital environments,” says Daccache.

“Over the last year CrowdStrike has made major investments and technology acquisitions around identity security and resilient architectures, as well as new product launches in the threat intelligence area, and we look forward to having these chats with business and security leaders during the summit.”

Share