3rd Party Risk Management , Breach Notification , Cybercrime

Kaseya Ransomware Attack: 'It Could Have Been Much Worse'

Michael Daniel of Cyber Threat Alliance on Impact of Latest Supply Chain Attack
Michael Daniel, president and CEO, Cyber Threat Alliance

It was stealthy, and it was widespread. But perhaps the Kaseya VSA ransomware attack wasn't quite as effective and damaging as initially feared, says Michael Daniel, president and CEO of the Cyber Threat Alliance. He explains where defenses succeeded.

See Also: Ransomware Response Essential: Fixing Initial Access Vector

In a video interview with Information Security Media Group, Daniel discusses:

  • The significance of the Kaseya attack;
  • Why the attack might not have been as successful as initially believed;
  • How U.S. ransomware defense needs to change - starting with disrupting the adversaries.

Daniel serves as the president and CEO of the Cyber Threat Alliance, a nonprofit organization that enables high-quality cyberthreat information-sharing among cybersecurity organizations. He also works with the Aspen Cyber Group, the World Economic Forum and other organizations improving cybersecurity in the digital ecosystem. Prior to CTA, he served from 2012 to 2017 as U.S. cybersecurity coordinator, leading U.S. cybersecurity policy development, overseeing U.S. government partnerships with the private sector and other nations and managing significant incident response activities. From 1995 to 2012, Daniel worked for the Office of Management and Budget, overseeing the U.S. Intelligence Community.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing fraudtoday.io, you agree to our use of cookies.