WannaCry ransomware attack
- Creating a Secure Organisation
- Resolving Critical Issues and Crises
WannaCry ransomware attack - what next?
On 12 May, the WannaCry ransomware attack began, impacting companies worldwide. The campaign was indiscriminate and overran companies in multiple sectors across the world. It may prove to be one of the largest cyber-attacks in history. And it won’t be the last.
In this webinar, our cyber experts provide concrete detail on how the attacks were mounted and their effect. They draw from Control Risks’ own Cyber Threat Intelligence and from their experience of helping clients deal with both this attack and similar attacks in the past.
- What happened and why
- How the campaign is likely to evolve
- What will the next attack look like?
- How to prevent a breach
- Actions in the event of a breach
- Toby Chinn, Head of Cyber Security
- Nicolas Reys, Head of Cyber Threat Intelligence
Fill in your details below to access a recording of the webinar.
As security professionals, we spend of the majority of our time trying to understand risks and threats and how to mitigate them.
Now that the General Data Protection Regulation (GDPR) is in effect, incident and crisis managers will need to adapt to the changes that the regulation will bring to the process of responding. We have identified a few key changes that we can expect as the regulation comes into force.
The grip of the so-called Islamic State (IS) may have loosened in its Middle Eastern heartland, but the global threat posed by Islamist terrorism has grown and spread. Control Risks’ incident tracking shows the majority of Islamist attacks still...
Crisis management isn’t a plan on a bookshelf but rather a full lifecycle that reinforces itself over time, creating a stronger, better prepared and more resilient organization.
The 2018 FIFA World Cup will take place in Russia from 14 June to 15 July. With major sporting events increasingly targeted in cyber attacks, travellers to the event are likely to attract the attention of a range of cyber threat actors.