Ransomware Running Wild in the Cloud
Threat actors evolved their methods conducting ransomware attacks in the cloud and on-premise during 2023 and show no signs of stopping. This discussion addresses initial access factors and threat actor trends associated with cloud ransomware attacks, including a shift to server-side exploits and prioritization of data exfiltration over data encryption. Content also includes notable incidents, attack models, and examples of how threat actors are adapting their methods to conduct ransomware attacks in the cloud. This presentation is based on technical research and analysis derived from multiple sources, including Google Cloud teams and the cybersecurity industry. Attendees will gain increased awareness of threat actor activity used to conduct ransomware attacks in the cloud along with multiple approaches to help prevent ransomware in cloud environments, including actionable cloud-specific security risk mitigations, resources, and industry best practices for preventing ransomware in the cloud.
View upcoming Summits: http://www.sans.org/u/DuS
SANS Ransomware Summit 2024
Ransomware Running Wild in the Cloud
Crystal Lister, Cloud Security Technical Program Manager, Google
Видео Ransomware Running Wild in the Cloud канала SANS Digital Forensics and Incident Response
View upcoming Summits: http://www.sans.org/u/DuS
SANS Ransomware Summit 2024
Ransomware Running Wild in the Cloud
Crystal Lister, Cloud Security Technical Program Manager, Google
Видео Ransomware Running Wild in the Cloud канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Информация о видео
2 июля 2024 г. 19:52:36
00:33:29
Другие видео канала
![Episode 129: Encryption - Part 5](https://i.ytimg.com/vi/rzi1daXMxAY/default.jpg)
![Detecting Malicious Actors in Google Workspace](https://i.ytimg.com/vi/HzuVhbpO_go/default.jpg)
![Deciphering Browser Hieroglyphics - SANS Digital Forensics and Incident Response Summit 2017](https://i.ytimg.com/vi/LnhSTZgzKuY/default.jpg)
![Why take FOR585: Smartphone Forensic Analysis In-Depth OnDemand](https://i.ytimg.com/vi/4pZHdsOdAVk/default.jpg)
![Episode 61: Selecting a bulletproof password](https://i.ytimg.com/vi/tNhftPyso04/default.jpg)
![SaaS Hunting | 2020 Threat Hunting & Incident Response Summit](https://i.ytimg.com/vi/boW-yAArbTo/default.jpg)
![How has FOR578 - Cyber Threat Intelligence helped you in your current job?](https://i.ytimg.com/vi/3OIThCrQItU/default.jpg)
![Forensic Analysis of sUAS aka Drones - SANS DFIR Summit 2015](https://i.ytimg.com/vi/36rZy9V_avo/default.jpg)
![Episode 156: IPv4 - Part 2](https://i.ytimg.com/vi/RTYpg3_begQ/default.jpg)
![Episode 128: Encryption - Part 4](https://i.ytimg.com/vi/3nMCkmkPSSA/default.jpg)
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/MApq8mSGZUk/default.jpg)
![Tracking Traces of Deleted Applications - SANS DFIR Summit 2019](https://i.ytimg.com/vi/4LcQm4ErXpA/default.jpg)
![Episode 38: What is the defense expert’s role - Part 4](https://i.ytimg.com/vi/abWENFCJz0Y/default.jpg)
![Episode 155: IPv4 - Part 1](https://i.ytimg.com/vi/DqeZMIL2iVM/default.jpg)
![Episode 102: USB Forensics Series - Part 4 of 7](https://i.ytimg.com/vi/Uws4XYDZFwI/default.jpg)
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/h6dJozJuLS0/default.jpg)
![SANS Threat Analysis Rundown (STAR)](https://i.ytimg.com/vi/oIvCYMCFFzU/default.jpg)
![Cracking the Beacon: Automating The Extraction of Implant Configurations](https://i.ytimg.com/vi/3NzCysnltNg/default.jpg)
![SANS DFIR WEBCAST: Smartphone Forensics Moves Fast. Stay Current or You May Miss Relevant Evidence!](https://i.ytimg.com/vi/E0P9IzJJIsU/default.jpg)
![FOR585 Course Animation: Solid State Memory Properties](https://i.ytimg.com/vi/LvmiAuV6PJA/default.jpg)