Mitigating Ransomware

Slides:



Advertisements
Similar presentations
COMPUTER CRIME An Overview Agenda u Background and History u Potential Criminals u Ethics Survey u Criminal Activity u Preventative Measures u Background.
Advertisements

SIRT Contact Orientation Security Incident Response Team Departmental Security Contacts April 16, 2004.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
Chapter 2 Securing Network Server and User Workstations.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
January 07 th 2016 Intelligence Briefing NOT PROTECTIVELY MARKED.
©2015 HEAT Software. All rights reserved. Proprietary & Confidential. Ransomware: How to Avoid Extortion Matthew Walker – VP Northern Europe.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
Jttconnect.com Cyber Security Threats: Understanding and Mitigating the Risk Nic Cofield | Jackson Thornton Technologies.
Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.
California Telehealth Network Annual Overview.
Protecting Against Cyber Attacks PLEASE TAKE A MINUTE TO LOOK AT THIS IMPORTANT MESSAGE. THIS IS HAPPENING HERE AND NOW! LET US SAVE YOU AND YOUR INFORMATION.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Understanding and breaking the cyber kill chain
Is Endpoint security dead?
Presented by: SBS CyberSecurity © SBS CyberSecurity, LLC
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Technology and Business Continuity
Ransomware Guidance For Health Centers
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Leverage the Cloud to Minimize the Impact of Ransomware
Your security risk is higher than ever.
Cybersecurity - What’s Next? June 2017
[Internal Use] for Check Point employees​
Educause/Internet 2 Computer and Network Security Task Force
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
David Brown, MBA Certified Information Systems Security Professional (CISSP) Security Expert (GSE) Critical [Security] Controls Certification (GCCC) Exploit.
Security Standard: “reasonable security”
Managing Secure Network Systems
Welcome to Milton’s Parts Express
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Cyber Security & IT: What’s Next?
Cyber Security Awareness Workshop
Security in the Workplace: Information Assurance
Trends in Ransomware Distribution
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Endpoint Security Market to grow at 7% CAGR from 2017 to 2024: Global Market.
Tool Server Workstation Router Universal
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
CSI Survey 2007 Tiffany Gorman
Call AVG Antivirus Support | Fix Your PC
Internet and Network Security
4 ways to stay safe online 1. Avoid viruses and phishing scams
Ransomware: What is it, How to avoid it and How to protect your data
Cyber Issues Facing Medical Practice Managers
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Threat Trends and Protection Strategies Barbara Laswell, Ph. D
The Practical Side of Meaningful Use:
Ransomware and Data breaches in public libraries
Faculty of Science IT Department By Raz Dara MA.
Computer Emergency Response Team
Computer Security By: Muhammed Anwar.
The Secure Contingency Plan
CSCD 434 Spring 2019 Lecture 10 Attacks for Profit Ransomeware 1.
IASP 470 PROJECT PROPOSAL MALWARE DETECTION
Why Cyber Security is important to SME? Useful Tips on how you protect and secure your business. By Ronald Soh from Win-Pro Consultancy Pte Ltd
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
To Pay or Not to Pay? Intelligent Ransomware Response
Cybersecurity Simplified: Ransomware
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Cloud Computing for Wireless Networks
Presentation transcript:

Mitigating Ransomware Good Morning everyone. My name is James Reece and I am the Network Manager for Portland Community College. Little bit about me…I have a bachelors' in Computer Science with a focus in network communication and I have been in enterprise networking most of my 15 years in IT. I have worked for Department of Defense, Army, Intel, and again currently at PCC. Presented by James Reece Portland Community College Confidential

Recent organizations effected by Ransomware What is ransomware History of ransomware Recent organizations effected by Ransomware Dangers of paying ransomware Organizational approach to ransomware mitigation Today I will be taking you on a journey towards mitigating Ransomware. We will talk cover these different topics on our journey: -What is Ransomware? -History of Ransomware -Dangers of paying Ransomware -Mitigating Ransomware from an organization approach -Mitigating Ransomware from an end user approach The Journey towards mitigating Ransomware Portland Community College Confidential

A type of software designed to block access to a computer system until a sum of money is paid. Picture for Wired What is Ransomware? Portland Community College Confidential

A little history about Ransomware. In 1989, Joseph L A little history about Ransomware. In 1989, Joseph L. Popp created the AIDS Trojan considered by most to be the first ransomware software. It was distributed by the World Health Organization by disc during an international AIDS conference. It is widely believe the first record incident involving remote delivery was in 2005 with Gpcoder in Russa. Over the past 11 years, Ransomware has evolved from one unique program to over 100 different variations in 2016. History of Ransomware Portland Community College Confidential

Recent Organizations effected by Ransomware University of Calgary - $15,780 Kansas Heart Hospital - $17,000 California Hollywood Presbyterian Medical Center - $17,000 Collinsville, Alabama, Police Department – Loss of Data Cyber attacks and ransomware specifically have appeared more frequently in the news and media. Here is a few examples in the last couple of years. Just to name a few… BBC reports in June 2016, that the University of Calgary payed hackers 15,780 USD worth of bitcoins to decrypt critical. Healthcare IT News reports that Kansas Heart Hospital paid 17,000 USD to have critical data decrypted. NBC news reports California Hollywood Presbyterian Medial Center paid 17,000 USD as well. NBC news the second possible out come with loss of data from the Collinsville Police Department in Alabama. The Portland FBI and Homeland security field departments have estimated about 17,000 northwest business have been effected this year alone by ransomware. Recent Organizations effected by Ransomware Portland Community College Confidential

- No Guarantee they will give you the key to unlock your data. - Once you have paid, you are considered a soft target for repeatable attacks. - Fuels Cyber criminals to develop more sophisticated ransomware. So what are the dangers of paying ransomware? Dangers of Paying Ransomware? Portland Community College Confidential

Prevent Contain Respond Three main stages of Ransomware mitigation There are three main stages/pieces required for ransomware mitigation: Prevent Contain Respond With in these we need a communications strategy and a technical strategy to help mitigate ransomware Three main stages of Ransomware mitigation Portland Community College Confidential

Prevent Communication/interaction Strategy: End user Training Videos/Articles Workshops IT/Community interaction On going collaboration between IT and community Review of infection strategy and policy Organizational approach to mitigating ransomware Portland Community College Confidential

Prevent Technical strategy Email Security Intrusion Prevention Browser Protection Regular updates/patches for OS or software Offsite & Secondary Backup solution Organizational approach to mitigating ransomware Portland Community College Confidential

Communication/interaction Strategy: Contain Communication/interaction Strategy: Communicate that a virus is on the network. Communicate with the effected end host user to contain the system. Organizational approach to mitigating ransomware Portland Community College Confidential

Contain Technical strategy Network Anti-Virus/Anti-Bot End point Anti-Virus/Malware Periodic Penetration testing Periodic End point scans Threat Emulator Organizational approach to mitigating ransomware Portland Community College Confidential

Respond Communication/interaction Strategy: Communicate with end user(s) about the status of system. Work with End user(s) to launch an investigation into the cause of the infection. Community with Community to avoid infecting other systems with the same Virus. Organizational approach to mitigating ransomware Portland Community College Confidential

Respond Technical strategy Disconnect the system from the network. Scan system for Ransomware Remediate Full restore from previous back up solution Organizational approach to mitigating ransomware Portland Community College Confidential