Ransoming Critical Infrastructure: Ransomware Attack on Colonial Pipeline - SANS Emergency Webcast
During the presentation, Tim Conway highlighted that over 30 similar outages on the Colonial Pipeline have occurred over the past 20 years due to storms, ruptures, or mechanical impacts. The current pipeline disruption is the first cyber-related shutdown that has occurred. Tim continued, “None of those 30 events bubbled up to a national level response at the scale we are currently seeing with the current cyber attack.”
“If you are an organization, don’t point to your IT incident response plan and assume it’s good… look towards OT specific IR plans.” - Tim Conway
As ransomware attacks continue to impact organizations around the world, and with recent events like the colonial pipeline impacts, we are seeing more and more attacks that have an adjacent or direct impact on Operational Technology environments. As ransomware attacks continue to rise, how should companies think about the cyber to physical impacts to their OT environments? Organizations responsible for operating and maintaining critical infrastructure environments need to consider the steps they should be pursuing right now before a potential attack occurs, establish and implement procedures on how or if they should operate their systems during an attack, and what actions need to be taken after an attack.
Tim Conway & Jeff Shearer will discuss how organizations responsible for operating & maintaining critical infrastructure environments need to consider the following:
- Steps to pursue before a potential attack
- Procedures to implement during an attack
- Actions necessary to take after an attack
SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.
Видео Ransoming Critical Infrastructure: Ransomware Attack on Colonial Pipeline - SANS Emergency Webcast канала SANS Institute
“If you are an organization, don’t point to your IT incident response plan and assume it’s good… look towards OT specific IR plans.” - Tim Conway
As ransomware attacks continue to impact organizations around the world, and with recent events like the colonial pipeline impacts, we are seeing more and more attacks that have an adjacent or direct impact on Operational Technology environments. As ransomware attacks continue to rise, how should companies think about the cyber to physical impacts to their OT environments? Organizations responsible for operating and maintaining critical infrastructure environments need to consider the steps they should be pursuing right now before a potential attack occurs, establish and implement procedures on how or if they should operate their systems during an attack, and what actions need to be taken after an attack.
Tim Conway & Jeff Shearer will discuss how organizations responsible for operating & maintaining critical infrastructure environments need to consider the following:
- Steps to pursue before a potential attack
- Procedures to implement during an attack
- Actions necessary to take after an attack
SANS is the most trusted and by far the largest source for information security training and security certification in the world. It also develops, maintains, and makes available at no cost, the largest collection of research documents about various aspects of information security, and it operates the Internet's early warning system - the Internet Storm Center.
Видео Ransoming Critical Infrastructure: Ransomware Attack on Colonial Pipeline - SANS Emergency Webcast канала SANS Institute
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
How Threats Are Slipping In the Back Door - SANS ICS Security Summit 2017How to Present Cyber Security Risk to Senior Leadership | SANS WebcastDon’t Wake Up to a Ransomware AttackColonial Pipeline Hack: Critical infrastructure under cyber attack?The first 20 hours -- how to learn anything | Josh Kaufman | TEDxCSULOCKED OUT! Detecting, Preventing, & Reacting to Human Operated RansomwareIt's Rocket Science! with Professor Chris BishopWhat You Need to Know About Kaseya Ransomware| AT&T ThreatTraqWhy Ransomware Attacks Are on the Rise and How the U.S. Can Fight Them | WSJThe Foundation of Accelerating your Cybersecurity Career - SANS@Mic Keynote w/ James LyneReal-Time OSINT: Investigating Events as They Happen | SANS OSINT Summit 2020SANS Emergency Webcast: What you need to know about the SolarWinds Supply-Chain AttackSANS Webcast - Perimeter Security and Why it is ObsoleteSANS Webcast - Zero Trust ArchitectureWhat the Colonial Pipeline ransomware attack suggests about critical infrastructure securityHunting Human Operated Ransomware Operators | 2020 Threat Hunting & Incident Response SummitHow a cyber attack crippled the Colonial PipelineWorld’s Longest Subsea Pipeline | Megastructures | Free DocumentaryWhat is Ransomware, How it Works and What You Can Do to Stay ProtectedDEMO: The Anatomy of Ransomware