Scareware & Ransomware to Destructionware: The Evolution of the Cyber Criminal and How to Stop Them
Scareware & Ransomware to Destructionware: The Evolution of the Cyber Criminal and How to Stop Them
There is less risk, greater reward, and potentially lesser hassle for malicious actors to rob a bank through hacking or electronic extortion, than using a machine gun, a mask, and a getaway vehicle. This fact has changed real-world security to focus less
on physical premises and more upon cyberspace.
In this informative webinar with cybersecurity focus, Ian Trump, a former officer with the Canadian Forces Military Intelligence Branch, shares his experiences about the evolution of cybercrime, and how wanted criminals are adapting their techniques in
new and unanticipated ways.
Crime as a service. A new industry has emerged, where skilled espionage and incursion practitioners sell their services on a cloud-like scale.
Security patches are clues. The smarter practitioners have discovered that by reverse-engineering a security patch, they can pinpoint the locations of the most vulnerable software code currently deployed, and may have time to exploit it before the
patch is widely disseminated.
Out in the open. Cyber criminals are having plenty of luck leveraging known software exploits, since IT departments and information security professionals are often too slow to effectively update their own systems.
Resilience is key. With the cybersecurity tools presently at the disposal of IT and infosec, there’s no excuse for being unable to positively respond to a customer whose critical data is being threatened by ransomware.
Find out why this veteran cybersecurity expert is more confident than ever in the ability of trained professionals to thwart the designs of evolved cyber criminals, in this recorded presentation.