Fraud Management & Cybercrime , Governance & Risk Management , IT Risk Management

Ransomware: A Problem of Excesses

BeyondTrust's Morey Haber and James Maude on Reducing Ransomware Risk

You can't decrease the motivation of ransomware attackers. But you can curb their success by bolstering your own enterprise's approach to access, credentials and privileges. Morey Haber and James Maude of BeyondTrust share insights on ransomware defense.

In a video interview with Information Security Media Group, Haber and Maude discuss:

  • The most successful of today's ransomware techniques;
  • How the actual malware has been refined;
  • How to strengthen defenses by addressing access, credentials and privileges.

Haber has more than 25 years of IT industry experience. He currently oversees BeyondTrust security and governance for corporate and cloud-based solutions and regularly consults for global periodicals and media. He joined BeyondTrust in 2012 as a part of the eEye Digital Security acquisition. He had served as a product owner and solutions engineer at eEye since 2004. Prior to that, he was beta development manager for Computer Associates Inc. Haber began his career as a reliability and maintainability engineer for a government contractor, building flight and training simulators. He is the author of the books "Privileged Attack Vectors," "Asset Attack Vectors," and "Identity Attack Vectors."

Maude has broad experience in security research and conducting in-depth analyses of malware and cyberthreats to identify attack vectors and trends in the evolving security landscape. His background in forensic computing and active involvement in the security research community make him an expert voice on cybersecurity. He regularly presents at international events and hosts webinars to discuss threats and defense strategies.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.