SlideShare a Scribd company logo
1 of 7
Ransomware Hits the Public Sector
Chris Goettl and Phil Richards
September 4, 2019
Agenda Items
 Don’t Mess With Texas
 School’s Out Forever!
 Public Sector Ransomware Wrap-up
 Who’s In Your Wallet?
Situation Analysis Recommendations
Exploit Type:
Exposure: Attack Vectors:Impact:
Data Held Hostage: Texas Local Government
Phishing TrainingBackup and Recovery
Multi-factor Authentication
Patch Vulnerabilities
Restrict Admin Privileges
Vendor Risk Management
Somebody messed with Texas. Twenty-three local
government agencies were hit in a coordinated
ransomware attack.
Ransomware
MSP
CVE
23
Local
Government
Agencies
System
Lockout
Situation Analysis Recommendations
Exploit Type:
Exposure: Attack Vectors:Impact:
State of Emergency: State of Louisiana
Phishing Training
Patch Vulnerabilities
Privilege Management
Backup and Recovery
School’s Out Forever! Outbound communications cutoff in four
Louisiana school districts, causing governor to declare state of
emergency and call out National Guard.
Ransomware
RATCVE
04
Phishing Training
Exploit Kit
School
Districts
System
Lockout
Public Sector Ransomware Wrap-up
U.S.
Conference
of Mayors
resolution
To pay or
not to pay
Insurance
company
payouts
Backup and
Recovery
issues
Why the
National
Guard?
Situation Analysis Recommendations
Exploit Type:
Exposure: Attack Vectors:Impact:
Credit Card Breach: Capitol One
Phishing Training
Privilege Management
Vendor Risk Management
Need to Know Access
Who’s in your wallet? In one of the biggest data breaches
ever, a hacker gained access to more than 100 million
customer account and credit card applications.
Insider Threat
$106M
Configuration Management
Customer
Data
Credit Card &
Social Sec
Numbers
Misconfigured
Software, &
Server-side
request forgery
Get the latest updates at: www.ivanti.com/ThreatThursday
Thank You!

More Related Content

Similar to Ivanti Threat Thursday September 2019

Digital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging TacticDigital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging Tactic
Christopher Porter
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
Taylre Janak
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
Kristin Judge
 

Similar to Ivanti Threat Thursday September 2019 (20)

Marriage of Cyber Security with Emergency Management -- NEMA
Marriage of Cyber Security with Emergency Management  --  NEMAMarriage of Cyber Security with Emergency Management  --  NEMA
Marriage of Cyber Security with Emergency Management -- NEMA
 
Risk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security ControlsRisk Analysis using open FAIR and Adoption of right Security Controls
Risk Analysis using open FAIR and Adoption of right Security Controls
 
Crowdsourcing to Counter Violent Extremism and Online Radicalization
Crowdsourcing to Counter Violent Extremism and Online Radicalization Crowdsourcing to Counter Violent Extremism and Online Radicalization
Crowdsourcing to Counter Violent Extremism and Online Radicalization
 
Ivanti Threat Thursday for December 2019
Ivanti Threat Thursday for December 2019Ivanti Threat Thursday for December 2019
Ivanti Threat Thursday for December 2019
 
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar SeriesCyber Liability & Cyber Insurance - Cybersecurity Seminar Series
Cyber Liability & Cyber Insurance - Cybersecurity Seminar Series
 
Custom Essay Writing Service UK Uniresearche
Custom Essay Writing Service UK  UniresearcheCustom Essay Writing Service UK  Uniresearche
Custom Essay Writing Service UK Uniresearche
 
Article is your organisation ready for the next ransomware attack - paul wr...
Article   is your organisation ready for the next ransomware attack - paul wr...Article   is your organisation ready for the next ransomware attack - paul wr...
Article is your organisation ready for the next ransomware attack - paul wr...
 
Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt. Cyber Security Resilience from Metro Louisville Govt.
Cyber Security Resilience from Metro Louisville Govt.
 
Digital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging TacticDigital Blackmail as an Emerging Tactic
Digital Blackmail as an Emerging Tactic
 
August ivanti threat thursday deck final[1]
August ivanti threat thursday deck final[1]August ivanti threat thursday deck final[1]
August ivanti threat thursday deck final[1]
 
The Menace of Ransomware Attacks on Healthcare Systems.pdf
The Menace of Ransomware Attacks on Healthcare Systems.pdfThe Menace of Ransomware Attacks on Healthcare Systems.pdf
The Menace of Ransomware Attacks on Healthcare Systems.pdf
 
Safety, Sanctuary and Security
Safety, Sanctuary and SecuritySafety, Sanctuary and Security
Safety, Sanctuary and Security
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
250 words or moreRead the scenario below. Use the Internet to re.docx
250 words or moreRead the scenario below. Use the Internet to re.docx250 words or moreRead the scenario below. Use the Internet to re.docx
250 words or moreRead the scenario below. Use the Internet to re.docx
 
Threat_intelligence_Handbook
Threat_intelligence_HandbookThreat_intelligence_Handbook
Threat_intelligence_Handbook
 
NAGTRI Journal Article
NAGTRI Journal ArticleNAGTRI Journal Article
NAGTRI Journal Article
 
Cyber for Counties Guidebook
Cyber for Counties Guidebook Cyber for Counties Guidebook
Cyber for Counties Guidebook
 
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
6º Resseguro - A Evolução do Risco Cibernético e seu Impacto no Seguro - Kara...
 
2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas2 healthcares vulnerability to ransomware attacks by abhilas
2 healthcares vulnerability to ransomware attacks by abhilas
 
Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30Ivanti Threat Thursday for April 30
Ivanti Threat Thursday for April 30
 

More from Ivanti

More from Ivanti (20)

Français Patch Tuesday - Mai
Français Patch Tuesday - MaiFrançais Patch Tuesday - Mai
Français Patch Tuesday - Mai
 
Patch Tuesday de Mayo
Patch Tuesday de MayoPatch Tuesday de Mayo
Patch Tuesday de Mayo
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Patch Tuesday Italia Maggio
Patch Tuesday Italia MaggioPatch Tuesday Italia Maggio
Patch Tuesday Italia Maggio
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Patch Tuesday de Abril
Patch Tuesday de AbrilPatch Tuesday de Abril
Patch Tuesday de Abril
 
Français Patch Tuesday - Avril
Français Patch Tuesday - AvrilFrançais Patch Tuesday - Avril
Français Patch Tuesday - Avril
 
Patch Tuesday Italia Aprile
Patch Tuesday Italia AprilePatch Tuesday Italia Aprile
Patch Tuesday Italia Aprile
 
Français Patch Tuesday - Mars
Français Patch Tuesday - MarsFrançais Patch Tuesday - Mars
Français Patch Tuesday - Mars
 
Patch Tuesday de Marzo
Patch Tuesday de MarzoPatch Tuesday de Marzo
Patch Tuesday de Marzo
 
Patch Tuesday Italia Marzo
Patch Tuesday Italia MarzoPatch Tuesday Italia Marzo
Patch Tuesday Italia Marzo
 
March Patch Tuesday
March Patch TuesdayMarch Patch Tuesday
March Patch Tuesday
 
Patch Tuesday de Febrero
Patch Tuesday de FebreroPatch Tuesday de Febrero
Patch Tuesday de Febrero
 
2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février2024 Français Patch Tuesday - Février
2024 Français Patch Tuesday - Février
 
Patch Tuesday Italia Febbraio
Patch Tuesday Italia FebbraioPatch Tuesday Italia Febbraio
Patch Tuesday Italia Febbraio
 
2024 February Patch Tuesday
2024 February Patch Tuesday2024 February Patch Tuesday
2024 February Patch Tuesday
 
2024 Enero Patch Tuesday
2024 Enero Patch Tuesday2024 Enero Patch Tuesday
2024 Enero Patch Tuesday
 
2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday2024 Janvier Patch Tuesday
2024 Janvier Patch Tuesday
 
2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday2024 Gennaio Patch Tuesday
2024 Gennaio Patch Tuesday
 
Patch Tuesday de Enero
Patch Tuesday de EneroPatch Tuesday de Enero
Patch Tuesday de Enero
 

Recently uploaded

Recently uploaded (20)

Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
Event-Driven Architecture Masterclass: Engineering a Robust, High-performance...
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Generative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdfGenerative AI Use Cases and Applications.pdf
Generative AI Use Cases and Applications.pdf
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 

Ivanti Threat Thursday September 2019

  • 1. Ransomware Hits the Public Sector Chris Goettl and Phil Richards September 4, 2019
  • 2. Agenda Items  Don’t Mess With Texas  School’s Out Forever!  Public Sector Ransomware Wrap-up  Who’s In Your Wallet?
  • 3. Situation Analysis Recommendations Exploit Type: Exposure: Attack Vectors:Impact: Data Held Hostage: Texas Local Government Phishing TrainingBackup and Recovery Multi-factor Authentication Patch Vulnerabilities Restrict Admin Privileges Vendor Risk Management Somebody messed with Texas. Twenty-three local government agencies were hit in a coordinated ransomware attack. Ransomware MSP CVE 23 Local Government Agencies System Lockout
  • 4. Situation Analysis Recommendations Exploit Type: Exposure: Attack Vectors:Impact: State of Emergency: State of Louisiana Phishing Training Patch Vulnerabilities Privilege Management Backup and Recovery School’s Out Forever! Outbound communications cutoff in four Louisiana school districts, causing governor to declare state of emergency and call out National Guard. Ransomware RATCVE 04 Phishing Training Exploit Kit School Districts System Lockout
  • 5. Public Sector Ransomware Wrap-up U.S. Conference of Mayors resolution To pay or not to pay Insurance company payouts Backup and Recovery issues Why the National Guard?
  • 6. Situation Analysis Recommendations Exploit Type: Exposure: Attack Vectors:Impact: Credit Card Breach: Capitol One Phishing Training Privilege Management Vendor Risk Management Need to Know Access Who’s in your wallet? In one of the biggest data breaches ever, a hacker gained access to more than 100 million customer account and credit card applications. Insider Threat $106M Configuration Management Customer Data Credit Card & Social Sec Numbers Misconfigured Software, & Server-side request forgery
  • 7. Get the latest updates at: www.ivanti.com/ThreatThursday Thank You!