02.02.2022 Views

Cyber Defense eMagazine February Edition for 2022

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors). Please check them out and see how much more CDMG has to offer! Very respectfully and with much appreciation, Gary Miliefsky, Publisher

The view from the Publisher’s desk is very encouraging, based on celebrating 10 years of growth and success at Cyber Defense Magazine! When our tiny team began our journey at Cyber Defense Media Group (CDMG) together in January 2012, we were happy to help smaller, lesser-known innovators of infosec, get their message out there and Rise Above the noise. Now, after 10 years, we’re even helping multi-billion-dollar companies and governments around the globe with our offices in D.C., London, N.Y. and other locations in play, as we continue to scale, thanks to you – our readers, listeners, viewers and media partners. Beyond the magazine, in response to the demands of our markets, the scope of CDMG’s activities has grown into many media endeavors. They now include Cyber Defense Awards; Cyber Defense Conferences; Cyber Defense Professionals (job postings); Cyber Defense TV, Radio, and Webinars; and Cyber Defense Ventures (partnering with investors).
Please check them out and see how much more CDMG has to offer!

Very respectfully and with much appreciation,
Gary Miliefsky, Publisher

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Decision Trees in Case of a Ransomware Attack<br />

Does Your Organization Have a Procedure to Handle a Ransomware? Is It Worth Paying the<br />

Attackers?<br />

By Zsolt Baranya, In<strong>for</strong>mation Security Auditor, Black Cell Ltd.<br />

The number of ransomware attacks is growing from day to day, as mentioned many of the publications<br />

and reports. The ransomware kill chain, describes the phases of a ransomware attack, and each phases<br />

the security trams can implement some actions to mitigate the probability of occurrence. For example,<br />

the first phase of the ransomware kill chain is the campaign, where the security team can reduce the<br />

success of the campaign with awareness trainings. The second phase is the infection, where the security<br />

team can handle the situation with restricted file downloading methods and so on.<br />

But if the chain reaches the encryption phase, the preventive actions were not effective. In this case, only<br />

a few organizations have a playbook specified to handle the consequences of ransomware attacks. A<br />

decision tree had been created to help organizations where this type of playbook is missed.<br />

Consider actions <strong>for</strong> ransomware attack event<br />

Firstly, all the affected devices and systems that have been attacked have to be identified and must be<br />

disconnected from the network as soon as the detection occurred. This is the most important action<br />

be<strong>for</strong>e the incident handling starts!<br />

<strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> – <strong>February</strong> <strong>2022</strong> <strong>Edition</strong> 39<br />

Copyright © <strong>2022</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved worldwide.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!