Effective Ransomware Mitigation Strategies for Cybersecurity Resilience

cybersecurity n.w
1 / 5
Embed
Share

Implementing government guidance, such as securing remote access and network segmentation, can reduce the risk and impact of ransomware attacks. Additional measures like tabletop exercises and information sharing further enhance cybersecurity defense. Stay proactive to protect against evolving cybersecurity threats.

  • Cybersecurity
  • Ransomware Mitigation
  • Government Guidance
  • Network Segmentation
  • Cyber Exercises

Uploaded on | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Cybersecurity David McLeod Director IT Security and Risk Management

  2. Government Guidance onRansomware Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureauof Investigation(FBI)publishedajointcybersecurityadvisoryalert ReleasedMay11,2021 RecommendedmitigationsforCriticalInfrastructureAssetOwners 2

  3. Reduce the Risk of RansomwareAttacks https://us-cert.cisa.gov/ncas/alerts/aa21- 131a Secure remote access to IT or OT multifactor Email filter to block phishing attempts Phishing Exercises Filter network traffic Patching Limit remote access across networks Set antivirus/antimalware programs to conduct regular scans Harden devices and companysystems 3

  4. Reduce the ImpactofRansomware https://us-cert.cisa.gov/ncas/alerts/aa21-131a Implement network segmentation between IT and OT Further network segment critical OT systems Alternative plans to ensure ICS can be isolated if the connections cannot betrusted Test manual controls so that critical functions can be kept running if ICS or OT networks need to be takenoffline Secure and test backups Protect privileged accounts 4

  5. Additional Mitigations Ransomware tabletopexercises Industry cyber information sharing Penetration exercises using hacking tools that adversaries would use 5

Related


More Related Content