Business Continuity Management / Disaster Recovery , Fraud Management & Cybercrime , Governance & Risk Management

ISMG Editors’ Panel: Analysis of Kaseya Attack

Sizing Up the Impact of the Ransomware Attack and How to Mitigate Risks
Clockwise, from top left: Suparna Goswami, Anna Delaney, Mathew Schwartz and Tom Field

In the latest weekly update, a panel of Information Security Media Group editors discusses the repercussions of the Kaseya ransomware incident, the immediate response of the cybersecurity community and key risk management takeaways.

See Also: OnDemand Webinar | Cloud applications: A Zero Trust approach to security in Healthcare

The editors - Suparna Goswami, associate editor, ISMG Asia; Anna Delaney, director, productions; Mathew Schwartz, executive editor, Data Breach Today and Europe; and Tom Field, senior vice president, editorial - discuss:

  • Comments from Tom Kellermann of VMware Carbon Black on the timing and scale of the Kaseya attack;
  • How the Kaseya attack compares to other cyberattacks attributed to the REvil ransomware group, as well as key risk mitigation takeaways;
  • Insights from LafargeHolcim's Manish Dave on building a "zero trust" framework to help mitigate cyberattack risks.

The ISMG Editors' Panel runs on Fridays. Don't miss our previous installments, including the July 2 and June 25 editions, which respectively discuss the FBI's assessment of cybersecurity trends and open-source software security.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.