For a company to successfully achieve cyber-resiliency, it needs the full muscle of its leadership teams, across C-suites, boards, and investors. Discussing the emerging and existing threats on the cyber-threat landscape is @mk_palmore. #CyberSecureMIT #TechReviewEvents Image
There are four types of adversaries out there:

-The financially-motivated adversary (they’re responsible for the vast majority of adversarial activity)
-The advanced, persistent threat (ie. nation states)
-The insider threat
-The hacktivist

#CyberSecureMIT Image
.@mk_palmore is surprised by the prevalence of ransomware because many of these adversaries rely on known vulnerabilities. #CyberSecureMIT
He's also on this data breach investigations report from @VerizonBusiness #CyberSecureMIT enterprise.verizon.com/resources/repo…
And this cloud threat report from his company, @PaloAltoNetEMEA. #CyberSecureMIT start.paloaltonetworks.com/unit-42-cloud-…
You have to think like the cyber-adversary to better protect yourself from cyber threats. #CyberSecureMIT Image
You should assume you will be attacked, and it may be successful. How you respond and recover is that resilience factor. #CyberSecureMIT Image
You can lower the impact of cyber-attacks with these best practices. #CyberSecureMIT #TechReviewEvents Image
Here's what consumers can do. #CyberSecureMIT #TechReviewEvents Image
If you enjoyed this thread, consider joining us for the rest of #CyberSecureMIT. Enter the "TWITTER" promo code at checkout to receive a discount on your ticket price.
emtech.technologyreview.com/cyber-secure-2…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with MIT Technology Review

MIT Technology Review Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @techreview

4 Dec
That not only means that countries face a huge logistical challenge to distribute them—which is complicated by the fact the two most promising vaccines require ultra-cold temperatures—but they also have to grapple with hard choices over who gets them first.
Here’s how the US, China, the UK, and other countries are planning to distribute covid-19 vaccines to their populations. technologyreview.com/2020/12/04/101…
Read 29 tweets
3 Dec
For the last session of #CyberSecureMIT, we’re speaking with @JamilFarshchi, Equifax’s CISO who was brought on after its data was breached in 2017. The Equifax hack was one of the biggest thefts of sensitive personal information of all time. technologyreview.com/2020/02/10/349…
“In the security industry today, we don’t have enough data to measure risk," says Farshchi. Most organizations have a dataset of one, which is their company. #CyberSecureMIT
To build a cyber-resilient organization, he says he asks:

-What are the predominant threat factors for any organization?
-What are the core controls that help you to be able to defend and minimize a particular threat?

#CyberSecureMIT #TechReviewEvents
Read 9 tweets
3 Dec
Over the years, we've written about this paradox of cryptocurrency, that it's semi-anonymous and inherently transparent. This is a story @strwbilly penned in 2018. #CyberSecureMIT technologyreview.com/2018/04/19/301…
We've also written about @chainalysis's reports that followed the crypto-breadcrumbs of the WannaCry heist. #CyberSecureMIT #TechReviewEvents technologyreview.com/2020/01/24/276…
Read 7 tweets
3 Dec
“It’s not too early to start thinking about a counter-strategy to the dilemmas we have” - Nazli Choucri of @MITPoliSci
#CyberSecureMIT #TechReviewEvents ImageImage
Bilateral agreements and global accords can be the beginnings of an international counter-strategy to cyberattacks, says Choucri. #CyberSecureMIT #TechReviewEvents Image
Read 4 tweets
3 Dec
"We’ve seen a 400% increase from 2018 to 2020 in the number of ransomware incidences we have responded to," says @JohnHultquist of @FireEye . "It’s clearly overshadowing other threats right now." Image
Why? Money.

"Money is just flooding in to these actors," says @JohnHultquist. "It’s clearly very profitable."

In one incident, a ransomware attacker demanded $36 million. From March 2019 to March 2020, another actor increased their ransomware demands 180%. #CyberSecureMIT
Both @JohnHultquist and @HalvorMolland agree that serious government policy responses are needed. Otherwise, ransomware will continue to rise. #CyberSecureMIT #TechReviewEvents
Read 5 tweets
3 Dec
You may remember the @NorskHydroASA ransomware attack on March 19, 2019. On that day, one of the world’s largest producers of aluminum had a unique response strategy to the attack: pay no ransom and admit the breach. #CyberSecureMIT #TechReviewEvents technologyreview.com/2019/03/19/136…
At #CyberSecureMIT, we’re speaking with the company’s senior vice president, @HalvorMolland, about this response strategy, which resulted in unprecedented transparency and a distributed workstream that included forensics, communication management, and rebuilding. Image
.@NorskHydroASA's decision to shut down its information-systems infrastructure happened at a relatively low level, says @HalvorMolland. It was “based on risk analysis and training we had in the past. This was the right decision to take.” #CyberSecureMIT #TechReviewEvents
Read 9 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!