Critical Infrastructure Security , Cybercrime , Cybercrime as-a-service

Preparing for Ransomware Attacks in the Education Sector

Matthew Trump of The University of London on Building Effective Response Plans
Matthew-Trump, Senior IT Security Officer, University of London

A spate of recent ransomware incidents affecting the education sector has led to the loss of student coursework, financial records and data relating to COVID-19 testing. Matthew Trump, senior IT security officer for the University of London, U.K., outlines incident response strategies to avoid such consequences.

See Also: 10 Incredible Ways You Can Be Hacked Through Email & How To Stop The Bad Guys

Trump highlights the importance of industry collaboration as a way to test a plan's effectiveness. "It's through regular testing and reviews of the plan, sharing our plan with external consultants, where we can with colleagues in the sector, because there's no competitive advantage here in having a better plan than anyone else," he states.

In a video interview with Information Security Media Group, Trump discusses:

  • The spate of ransomware attacks targeting the education sector;
  • Balancing cybersecurity and academic freedom;
  • Customizing an incident response plan and testing its effectiveness.

Trump is the senior IT security officer at the University of London. He has held a number of IT security roles in higher education, focusing mainly on governance, risk and compliance.


About the Author

Anna Delaney

Anna Delaney

Director, ISMG Productions

An experienced broadcast journalist, Delaney conducts interviews with senior cybersecurity leaders around the world. Previously, she was editor-in-chief of the website for The European Information Security Summit, or TEISS. Earlier, she worked at Levant TV and Resonance FM and served as a researcher at the BBC and ITV in their documentary and factual TV departments.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.