Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
Artwork

Content provided by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The History of Ransomware: From Malware-Ridden Floppy Disks to "Trusted" Cyber Gang Tycoons

20:33
 
Share
 

Manage episode 335761218 series 3376008
Content provided by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Chief Security Officer Phil Richards rejoins Chris Goettl, Head of Endpoint Security Product Management, for a history lesson of ransomware attacks: starting with its origins on malware-riddled floppy disks and ending with predictions of where ransomware gangs will go after several recent -- and highly publicized -- ransoms.
Today's talk covers:

  • The start of ransomware as malware hidden in floppy disks containing AIDS education materials that required victim users to mail paper checks as ransom to Panama
  • The recent explosion in value of ransomware extortions from a few thousand USD and four days down time... to $4.1 million USD ransoms of the Colonial Pipeline and weeks or months of time to restoration.
  • Why the ransomware business model requires users to trust the criminal actors (as odd as that seems!)
  • How ransomware gangs are expected to adapt to modern cybersecurity defenses, requiring security teams to implement multiple tactics to prevent successful ransom attempts and interruption to business operations
  • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
  continue reading

52 episodes

Artwork
iconShare
 
Manage episode 335761218 series 3376008
Content provided by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Ivanti: Cybersecurity and Information Technology Solutions, Ivanti: Cybersecurity, and Information Technology Solutions or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://podcastplayer.com/legal.

Chief Security Officer Phil Richards rejoins Chris Goettl, Head of Endpoint Security Product Management, for a history lesson of ransomware attacks: starting with its origins on malware-riddled floppy disks and ending with predictions of where ransomware gangs will go after several recent -- and highly publicized -- ransoms.
Today's talk covers:

  • The start of ransomware as malware hidden in floppy disks containing AIDS education materials that required victim users to mail paper checks as ransom to Panama
  • The recent explosion in value of ransomware extortions from a few thousand USD and four days down time... to $4.1 million USD ransoms of the Colonial Pipeline and weeks or months of time to restoration.
  • Why the ransomware business model requires users to trust the criminal actors (as odd as that seems!)
  • How ransomware gangs are expected to adapt to modern cybersecurity defenses, requiring security teams to implement multiple tactics to prevent successful ransom attempts and interruption to business operations
  • Join the conversation online on LinkedIn (linkedin.com/company/Ivanti)
  continue reading

52 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play