Protect Your Assets a Data Protection and Cyber Resiliency Panel Prt228

Title

AWS re:Invent 2022 - Protect your assets: A data protection and cyber resiliency panel (PRT228)

Summary

  • Ransomware is a significant threat, occurring every 11 seconds and affecting thoughts on enterprise data management.
  • The healthcare industry is now the most attacked sector, with ransomware posing a threat to human lives.
  • AutoNation, as the largest automotive retailer, has multiple lines of business and is heavily reliant on technology, making it vulnerable to ransomware.
  • Cohesity, a data security and management company, emphasizes the balance between cybersecurity and IT services.
  • Ransomware is a wake-up call for industries, highlighting the need for cyber resiliency.
  • The panel discussed key components of ransomware defense, including training, backups, environment simplification, data knowledge, layered defenses, and incident response plans.
  • Data exfiltration is a growing concern, especially in healthcare, where it can lead to double extortion.
  • Traditional data protection methods like tape, archive, or replication are no longer sufficient due to unreliability and the need for faster recovery.
  • The panel concluded with the importance of having a plan for ransomware attacks and investing in both protection controls and strategies to minimize impact.

Insights

  • The healthcare industry's recent status as the most attacked sector for ransomware highlights the critical intersection of cybersecurity and public health.
  • The shift in ransomware attacks from just encrypting data to also exfiltrating it has increased the complexity of defense strategies.
  • The discussion on cyber resiliency reflects a shift from compliance-driven security postures to a more holistic approach that includes business continuity planning.
  • The panel's emphasis on incident response plans and regular rehearsals underscores the importance of preparedness and the ability to quickly recover from cyber incidents.
  • The mention of the need for a "rock-solid plan" for data recovery suggests that organizations should prioritize robust backup and restoration strategies.
  • The panel's acknowledgment of the limitations of traditional data protection methods like tape backups indicates a need for more modern, cloud-based, and hybrid solutions.
  • The conversation about the role of training in cybersecurity highlights the ongoing challenge of balancing user education with restrictive measures to mitigate human error.
  • The panel's discussion on third-party vendor management and the integration of security assessments into procurement processes provides insight into the growing complexity of supply chain security.