Slide 1

Slide 1 text

3"/40.8"3& JOUIF8PSLQMBDF $ISJT$PPQFSc4FDVSJUZ$POTVMUBOU

Slide 2

Slide 2 text

3BOTPNXBSFJTBUZQFPG NBMXBSFUIBUBJNTUPFYUPSU NPOFZGSPNUIFWJDUJN

Slide 3

Slide 3 text

"/"50.: */'&$5*0/  1":-0"%  413&"%  3"/40. 

Slide 4

Slide 4 text

"/"50.: */'&$5*0/  1":-0"%  413&"%  3"/40. 

Slide 5

Slide 5 text

*/'&$5*0/ 

Slide 6

Slide 6 text

*/'&$5*0/.&5)0%4

Slide 7

Slide 7 text

*/'&$5*0/.&5)0%4 &."*- 530+"/)034&7*" ","1)*4)*/(

Slide 8

Slide 8 text

*/'&$5*0/.&5)0%4 64# 530+"/)034&7*" %3*7&4 ","#"*5*/(

Slide 9

Slide 9 text

*/'&$5*0/.&5)0%4 */45"--&% 530+"/)034&7*" 40'58"3&

Slide 10

Slide 10 text

*/'&$5*0/.&5)0%4 ."-*$064 530+"/)034&7*" 8*5&4

Slide 11

Slide 11 text

*/'&$5*0/.&5)0%4 76-/&3"#*-*5*&4

Slide 12

Slide 12 text

*/'&$5*0/.&5)0%4 */45"--&%40'58"3& &."*- 64#%3*7&4 ."-*$*0648*5&4 76-/&3"#*-*5*&4

Slide 13

Slide 13 text

"/"50.: */'&$5*0/  1":-0"%  413&"%  3"/40. 

Slide 14

Slide 14 text

1":-0"% 

Slide 15

Slide 15 text

1":-0"%4

Slide 16

Slide 16 text

1":-0"%4 4$"3&8"3&

Slide 17

Slide 17 text

1":-0"%4 -0$,&3

Slide 18

Slide 18 text

1":-0"%4 $3:150

Slide 19

Slide 19 text

"*%45SPKBO

Slide 20

Slide 20 text

(QDPEF",

Slide 21

Slide 21 text

$SZQUP-PDLFS

Slide 22

Slide 22 text

1":-0"%4 -&",8"3&

Slide 23

Slide 23 text

&QJD

Slide 24

Slide 24 text

1":-0"%4 4$"3&8"3& $3:150 -0$,&3 -&",8"3&

Slide 25

Slide 25 text

"/"50.: */'&$5*0/  1":-0"%  413&"%  3"/40. 

Slide 26

Slide 26 text

413&"% 

Slide 27

Slide 27 text

%*44&.*/"5*0/.&5)0%4

Slide 28

Slide 28 text

%*44&.*/"5*0/.&5)0%4 /0/& -0$"-*/'&$5*0/0/-:

Slide 29

Slide 29 text

%*44&.*/"5*0/.&5)0%4 ."11&% /&5803, %3*7&4

Slide 30

Slide 30 text

%*44&.*/"5*0/.&5)0%4 6/."11&% /&5803, %3*7&4

Slide 31

Slide 31 text

%*44&.*/"5*0/.&5)0%4 5)&%*(*5"-,*/% 803.4

Slide 32

Slide 32 text

%*44&.*/"5*0/.&5)0%4 /0/& 6/."11&%%3*7&4 ."11&%%3*7&4 803.4

Slide 33

Slide 33 text

"/"50.: */'&$5*0/  1":-0"%  413&"%  3"/40. 

Slide 34

Slide 34 text

3"/40. 

Slide 35

Slide 35 text

1":.&/5.&5)0%4 3BOTPNXBSFIBTIJTUPSJDBMMZ MFWFSBHFEBSBOHFPGQBZNFOU NFUIPETUIBUBSFIBSEUPUSBDF TVDI BT10#PYFTBOEQSFQBJEDBSET /PXBEBZT NPTUVTF#JUDPJOPSPUIFS DSZQUPDVSSFODJFT

Slide 36

Slide 36 text

#*5$0*/ #JUDPJOJTEFDFOUSBMJTFEBOEDBOCF MFWFSBHFEUPBDIJFWFBOPOZNJUZ EFTQJUFUIFQVCMJDMFEHFS  #JUDPJOTDBOPGUFOCFMBVOEFSFEWJB NFUIPETUIBUBSFEJ⒏DVMUUPUSBDF

Slide 37

Slide 37 text

No content

Slide 38

Slide 38 text

"/"50.: */'&$5*0/  1":-0"%  413&"%  3"/40. 

Slide 39

Slide 39 text

3"/40.8"3& JNQBDUT #64*/&44&4 1. by encrypting network shares and spreading 2. by disrupting continuity 3. by never recovering data

Slide 40

Slide 40 text

“I don't know who you are. I don't know what you want. If you are looking for ransom, I can tell you I don't have money. But what I do have are a very particular set of skills, skills I have acquired over a very long career. Skills that make me a nightmare for people like you.”

Slide 41

Slide 41 text

13&7&/5 XJUIHPPEEJHJUBMIZHJFOF 1. keep software packages up-to-date 2. guard against phishing 3. guard against baiting 4. employ caution when visiting websites 5. employ caution when installing software 6. install and maintain anti-virus

Slide 42

Slide 42 text

13&1"3& GPSUIFVOFYQFDUFE 1. regularly backup 2. check and test your backups 3. employ the principle of least privilege 4. consider having a playbook or procedure in-place

Slide 43

Slide 43 text

3&410/% UPBUUBDLT 1. isolate infected machines 2. protect backups 3. do not pay the ransom 4. report internally and to the police
 (http://www.actionfraud.police.uk/)

Slide 44

Slide 44 text

3"/40.8"3& JOUIF8PSLQMBDF $ISJT$PPQFSc4FDVSJUZ$POTVMUBOU