Inside the Growing Complexity of Ransomware Hacking Groups
Security Breach
More Info
Security Breach
Inside the Growing Complexity of Ransomware Hacking Groups
Sep 11, 2024
Eric Sorensen

Send us a text

We’re back to discuss an all-too-familiar topic – ransomware.

Ironically enough, it seems the topics we describe in this manner become so familiar because we can’t figure out viable, long-term solutions. I think part of the challenge for industrial organizations dealing with ransomware is that we have to divide our energy and resources between prevention, detection and response. Any one of those is a challenge, but managing all three is daunting, and hackers know this. But so do the good guys - one of which is our guest for today’s episode. 

Listen as Jeff Krull, principal and leader of Baker Tilly’s cybersecurity practice discusses their Guide to Ransomware Prevention, as well as his thoughts on:

  • The C-suite's growing appreciation of how cyberattacks are impacting profitability, which means cybersecurity has become more than just an IT issue.
  • How more resources have made RaaS groups increasingly difficult to detect and stop.
  • Paying vs. not paying the ransom.
  • Why more cyber regulation is on the way.
  • Manufacturing's lack of redundant assets is making it a more attractive target, but also fueling action around response and recovery plans.
  • Why not everyone needs access to everything.

To catch up on past episodes, you can go to Manufacturing.net, IEN.com or MBTmag.com. You can also check Security Breach out wherever you get your podcasts, including Apple, Amazon and Overcast. And if you have a cybersecurity story or topic that you’d like to have us explore on Security Breach, you can reach me at jeff@ien.com.

To download our latest report on industrial cybersecurity, The Industrial Sector’s New Battlefield, click here.

Episode Artwork Inside the Growing Complexity of Ransomware Hacking Groups 31:41 Episode Artwork Time to 'Rip off the Band-Aid' to Ensure Security 38:52 Episode Artwork Combating the 20th Century Mafia with a Stronger Human Firewall 45:47 Episode Artwork Tearing Down the 'Set It and Forget It' Mindset 41:33 Episode Artwork Bridging the IT-OT Divide 20:09 Episode Artwork 'There's No Bulletproof Vest' in Cybersecurity 51:08 Episode Artwork Are We Over-Connected? 19:30 Episode Artwork The $25M 'Wake-Up Call' Supply Chain Hack 30:22 Episode Artwork The Dollars and Sense of Cybersecurity 40:06 Episode Artwork There's No 'Plant the Flag' Moment in Cybersecurity 32:47 Episode Artwork 'Nobody Should Get Ransomwared' 37:59 Episode Artwork The Protection and Productivity of Zero Trust 42:49 Episode Artwork OT's Legacy Tech Challenges 28:08 Episode Artwork Shutting Down 'Spy Board' Threats 34:01 Episode Artwork The OT Threat Landscape's Infectious Nature 43:15 Episode Artwork Knowing How to Arm Yourself for Battle 36:20 Episode Artwork Supply Chains Are a Hacker's Gateway 32:57 Episode Artwork The Hacks! 15:44 Episode Artwork Security Breach: Predictions That Landed 31:07 Episode Artwork DMZs, Alarm Floods and Prepping for 'What If?' 47:29 Episode Artwork Weaponizing Secure-By-Design 42:04 Episode Artwork The Impacts of Over-Connectivity and Mobile Defeatism 48:23 Episode Artwork Hackers Learn How to Attack You, From You 34:15 Episode Artwork The Largest Attack Surface - People 44:04 Episode Artwork Avoiding a 'Chicken Little' Cybersecurity Strategy 39:03