Get the full experience! Sign up to access transcripts, personalized summaries, and more features.
A manufacturer gets hit with ransomware. A hospital too. Learn how Threatlocker stops these types of attacks. This episode is brought to you by Threatlocker.
This episode is sponsored by ThreatLocker®. ThreatLocker® is a Zero Trust Endpoint Protection Platform that strengthens your infrastructure from the ground up. With ThreatLocker® Allowlisting and Ringfencing™, you gain a more secure approach to blocking exploits of known and unknown vulnerabilities. ThreatLocker® provides Zero Trust control at the kernel level that enables you to allow everything you need and block everything else, including ransomware! Learn more at www.threatlocker.com.
The episode provides a gripping account of an IT Operations Head managing a large manufacturing company who faced a devastating ransomware attack by 'Conti.' This attack, which spread swiftly across 250 servers and numerous endpoints, saw the entire business brought to a standstill. The speaker, reflecting on that fateful day, details the chaos that ensued, the lack of established protocols, and the emotional toll it took on him and his team. This story sets the stage for discussing the importance of understanding cybersecurity defenses.
Through personal experience, the speaker emphasizes how critical it is for organizations to have established protocols in place for cyber incidents. They discuss how, five years ago, they lacked a roadmap for responding to ransomware threats, which contributed to the attack's severity. It stresses the need for continuous improvement and training in the field of IT security, urging listeners to understand the necessity of being prepared for such attacks.
The episode highlights the features of ThreatLocker, focusing on its Zero Trust approach which stops all applications by default, allowing only those explicitly permitted. This strategy not only prevents ransomware attacks but also secures businesses from unknown threats. Details of how ThreatLocker was implemented in both the speaker's manufacturing organization and a hospital's network illustrate its significance in stopping potential threats and maintaining operational security.
Finally, the podcast provides real-world examples, including an account from a cybersecurity engineer who defended a hospital against a ransomware attack using ThreatLocker. Despite the hospital's lack of multi-factor authentication (MFA), the application control provided by ThreatLocker mitigated much of the threat. This discussion underscores the ongoing risks organizations face in today’s cyber landscape, while reinforcing the effectiveness of adopting a proactive security posture.
Join other podcast enthusiasts who are getting podcast summaries.
Sign Up Free