Former hacker Kevin Mitnick shows WannaCry to Wall Street execs

A gathering of Wall Street executives were given a first-hand explanation today on how to secure their companies against phishing attacks by a former hacker.

Famed hacker, turned consultant and chief hacking officer at the cybersecurity training firm Knowbe4, Kevin Mitnick said Tuesday the best methods to guard against “ransomworms” like WannaCry include inoculating employees and partners against phishing.

The best way to build this immunity, Mitnick told the audience at the 2017 Cyber Investing Summit at the New York Stock Exchange, is to “attack your employees,” but he warned give them notice so the exercise doesn't ruin morale. When the nibble at a phishing attempt, a splash screen should appear to show, they made a mistake.

“You've got a teachable moment,” he said.

Mitnick said, in addition, to engaging in awareness and training efforts, organizations must keep their third-party software up to date, applying patches as they are available.
During his presentation, Mitnick gave a demonstration of WannaCry in action to the audience.

This great takeaway and other interesting articles can be found at the source.

Source: SC MEDIA

Topics: Speaking Engagements, third-party software, WannaCry, cybersecurity training, cyber security, hackers, ransomworms, security awareness training, security consultant, security education, KnowBe4, Wall Street, 2017 Cyber Investing Summit, phishing, Kevin Mitnick, New Yourk Stock Exchange

Latest Posts

Kevin offers three excellent presentations, two are based on his best-selling books. His presentations are akin to technology magic shows that educate and inform while keeping people on the edge of their seats. He offers expert commentary on issues related to information security and increases “security awareness.”

The Growth of Third-Party Software Supply Chain Cyber Attacks

When testing your employees' social engineering readiness, your teams need simulated attacks that feel as if they’re coming from a nefarious engineer...

Read more ›

Bypassing Key Card Access: Shoring Up Your Physical Security

As you build additional layers of defense into your cybersecurity framework, it's important to implement physical security strategies as well.

Read more ›

How to Prioritize Your Pentesting Report’s Remediation Recommendations

If you recently received a penetration test, you’re on the right track to improving your cybersecurity posture. However, you may be wondering what the..

Read more ›
tech-texture-bg