Fraud Management & Cybercrime , Ransomware , Video

ISMG Editors: Why Are Ransomware Victims Still Paying?

Also: Cyber Resilience in Israel; Human Risk Management in the Era of Remote Work
Clockwise, from top left: Anna Delaney, Mathew Schwartz, Tom Field and Tony Morbin

In the latest weekly update, four ISMG editors discussed the number of ransomware victims who are paying a ransom to cybercriminals, the need for greater cyber resilience during wartime, and the critical role of human risk management in organizational cybersecurity in the era of remote work.

See Also: The State of OT Security: A Comprehensive Guide to Trends, Risks, and Cyber Resilience

The panelists - Anna Delaney, director, productions; Mathew Schwartz, executive editor of DataBreachToday and Europe; Tom Field, senior vice president, editorial; and Tony Morbin, executive news editor, EU - discussed:

  • Key takeaways from recent interviews with Israeli cybersecurity leaders including Windward CEO Ami Daniel, on resilience during the ongoing Israel-Hamas war;
  • Highlights from a new report by security firm Emsisoft revealing that the number of successful ransomware attacks is on the rise and victims are still paying the ransoms;
  • Human-centric challenges that organizations commonly overlook in their risk management strategies.

The ISMG Editors' Panel runs weekly. Don't miss our previous installments, including the Dec. 22 edition on CISOs' concerns and priorities for AI and the Dec. 29 edition on looking back at 2023.


About the Author

Anna Delaney

Anna Delaney

Director, Productions, ISMG

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.