Psychological Warfare: How Hackers Exploit Your Sense of Security

Psychological Warfare: How Hackers Exploit Your Sense of Security

Have you ever felt completely safe in the comfort of your own home, surrounded by loved ones? Cybercriminals know this feeling all too well, and they're using it to their advantage. In this eye-opening video, we delve into the world of psychological warfare in the realm of cybersecurity. We discuss how hackers are no longer interested in just stealing data or causing chaos - they want to get paid, and they're going after high-profile targets, including executives, politicians, and R&D leaders. We examine how hackers use it to gain leverage over their victims. We also explore the rise of ransomware and how cyber insurance plays into the equation. Don't miss this crucial discussion on how to protect yourself and your loved ones from the nefarious tactics of cybercriminals. Watch now to stay one step ahead of the hackers.

Watch the full video "How To Negotiate With Ransomware Groups and Hackers" https://youtu.be/5GZo2Ld5uIs

GUEST BIOS

Richard Cassidy

Richard Cassidy has been consulting to businesses on cyber security strategies and programs for more than two decades, working across highly regulated industries including finance, insurance, retail, manufacturing, government and military. During his career Richard has been heavily engaged in the design and implementation of infrastructure & cyber security solutions, helping organisations in evolving security, compliance, risk management, data assurance, automation, orchestration & breach response practices.
Combining hands-on experience with the technologies and services that have evolved over the past two decades, with a detailed perspective on end-user security risks, Richard focuses on delivering thought leadership tracks that help decision-makers define practical security, compliance and data assurance strategies. He is well versed in showing organisations how to better navigate a highly complex and automated threat landscape, in tandem with achieving (and maintaining) regulatory, compliance and data assurance mandates that business leaders face in today’s technology landscape.
Richard is an active industry contributor, regularly delivering speaker sessions at events including SANS, BlackHat, IP Expo, InfoSec, FSISAC and security seminars EMEA-wide, not least many article publications in the arena of cybersecurity, compliance, industrial control and emerging technology matters.

Oliver Rochford

Oliver Rochford has worked in cyber security as a penetration tester, consultant, researcher, and industry analyst for over 20 years. Interviewed, cited, and quoted by media, think tanks, and academia, he has written for Securityweek, CSO Online, and Dark Reading. While working at Gartner, he co-named the Security Orchestration, Automation and Response (SOAR) market, worked on the SIEM Magic Quadrant, and also covered the European MSSP Market. Prior to joining Securonix, Oliver worked for Qualys, Verizon, Gartner, Tenable, and Securonix. Oliver is Chief Furitist at Tenzir, where he works on product strategy and marketing.

Connect with Your host James Rees

Hello, I am James Rees, the host of the Razorwire podcast. This podcast brings you insights from leading cyber security professionals who dedicate their careers to making a hacker’s life that much more difficult.

Our guests bring you experience and expertise from a range of disciplines and from different career stages. We give you various viewpoints for improving your cyber security – from seasoned professionals with years of experience, triumphs and lessons learned under their belt, to those in relatively early stages of their careers offering fresh eyes and new insights.

If you need consultation, visit www.razorthorn.com, We give our clients a personalised, integrated approach to information security, driven by our belief in quality and discretion.

Linkedin: Razorthorn Security

Youtube: Razorthorn Security

Twitter: @RazorThornLTD

Website: www.razorthorn.com

#ransomware
#hackers
#cybersecurity