Top Banner
Ransomware: The NSA’s Top 10 Mitigation Strategies (and More) Phil Richards, Chief Security Officer Michael Dortch, Senior Product Marketing Manager
26

Ransomware Mitigation Strategies

Jan 16, 2017

Download

Technology

LANDESK
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Ransomware Mitigation Strategies

Ransomware: The NSA’s Top 10 Mitigation Strategies (and More)

Phil Richards, Chief Security OfficerMichael Dortch, Senior Product Marketing Manager

Page 2: Ransomware Mitigation Strategies

The Scope of the Problem

Page 3: Ransomware Mitigation Strategies

Ransomware has quickly emerged as one of

the most dangerous cyberthreats facing

both organizations and consumers, with

global losses now likely running to hundreds

of millions of dollars.

—Symantec Corp., “ISTR [Internet Security Threat Report] Special Report: Ransomware and Businesses 2016,”

Page 4: Ransomware Mitigation Strategies

Insecurity Everywhere

• “91% of…board members [surveyed] said they can’t read a cybersecurity report and are not prepared to handle a major attack.”

• “40% said they feel no responsibility for the consequences of being hacked.”

• “[Hacking] is costing the U.S. $5 trillion each year, or approximately one-third of our country’s GDP annually.”

• “90-95% of all hacking begins with a phishing email.”

Page 5: Ransomware Mitigation Strategies

The Government to the Rescue!

Page 6: Ransomware Mitigation Strategies

Three-Pronged Focus

Education

ProactivePreventionBusiness

Continuity

Page 7: Ransomware Mitigation Strategies

Outline of Activities

1. Educate your Staff

2. Email Hygiene3. Network Hardening4. System Hardening

5. Backup Data6. Incident Response

EducationProactive

PreventionBusiness Continuity

Page 8: Ransomware Mitigation Strategies

Education

Page 9: Ransomware Mitigation Strategies

Email Hygiene

Page 10: Ransomware Mitigation Strategies

Network Hardening

Page 11: Ransomware Mitigation Strategies

System Hardening

Page 12: Ransomware Mitigation Strategies

Backup Data

Page 13: Ransomware Mitigation Strategies

Incident Response

Page 14: Ransomware Mitigation Strategies

How We Help

Page 15: Ransomware Mitigation Strategies
Page 16: Ransomware Mitigation Strategies
Page 17: Ransomware Mitigation Strategies
Page 18: Ransomware Mitigation Strategies

Consolidation

Page 19: Ransomware Mitigation Strategies

Visualization

Page 20: Ransomware Mitigation Strategies

Personalization

Page 21: Ransomware Mitigation Strategies

The LANDESK Portfolio

S e c u r eC o n f i g u r a t i o n M a n a g e m e n t

A s s e tM a n a g e m e n t

S e r v i c eM a n a g e m e n t

U n i f i e dE n d p o i n t

M a n a g e m e n t

innovative, proven, consistent, customer-driven technologies

Page 22: Ransomware Mitigation Strategies

Not just technologies…• Partners• Services• User

Community• And more…

Page 23: Ransomware Mitigation Strategies

Up to 85 percent of targeted attacks are

preventable by:

• application whitelisting;

• patching of applications;

• patching of and operating systems; and

• restricting of administrative privileges.

—Australian Signals Directorate (ASD)(their equivalent of the US NSA)

Page 24: Ransomware Mitigation Strategies

Everybody works in security now.

—Dan Lutter, Director, Field Technology Services, Advocate Health Care

Page 25: Ransomware Mitigation Strategies

Questions?

Page 26: Ransomware Mitigation Strategies

Thanks. Let’s Talk.

Michael [email protected](US) 415-310-6480@DortchOnIT

Phil [email protected](US) 801-208-1642https://www.linkedin.com/in/phil-richards-3870402