Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":1164,"date":"2023-09-20T03:03:55","date_gmt":"2023-09-20T03:03:55","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/"},"modified":"2023-09-20T03:03:55","modified_gmt":"2023-09-20T03:03:55","slug":"ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/","title":{"rendered":"Ransomware Attacks on Gaming Industry – A CISO Perspective Deepen Desai"},"content":{"rendered":"

Post Content\u00a0\u00a0<\/p>\n

\u200b<\/p>\n

Ransomware attacks (and all cyberattacks, generally) all follow a similar sequence. In order to stop these attacks consistently, your security strategy should aim to disrupt as many stages of this attack chain as possible, which maximizes your chances of stopping the attack even if the threat actors should evade some of your security controls. The stages of the attack sequence are as follows:<\/p>\n

Figure 1: Ransomware attack sequence<\/p>\n

1. Reconnaissance: <\/strong>Many ransomware attacks–especially ones targeted to large organizations–are extremely well-researched. Threat actors find out all the information that they can about your company, including who works there, what infrastructure is exposed to the internet, what applications are in use, and where you likely keep your most sensitive information. A key tactic to disrupt reconnaissance is to make yourself hard to find and hard to exploit.<\/p>\n

Key tips:<\/p>\n

– Remove vulnerable, routable appliances such as VPNs and north-south firewalls, in favor of more modern options for secure access. <\/p>\n

– Hide your key applications behind a proxy architecture so that they can’t be exploited. <\/p>\n

– Keep software and devices up-to-date with the most recent versions and security patches.<\/p>\n

– Identify and remediate misconfigurations and oversharing in cloud storage that may lead to discoverable data.<\/p>\n

2. Compromise: <\/strong>Once a threat actor maps out their attack plan, they will need to compromise your organization. This could be through phishing, brute force, or through an exploit of a vulnerability. Putting robust inline security controls in place to deeply inspect traffic and block malicious files and behaviors is critical.<\/p>\n

Key tips:<\/p>\n

– Inspect as much traffic as possible–including encrypted traffic, as attackers utilize encrypted channels in more than 85% of attacks<\/a>. <\/p>\n

– Utilize layered AI-powered security controls, including inline sandboxing, to stop never-before-seen threats. Attackers spin up new infrastructure extremely rapidly; the average phishing page is only 13 hours old. Relying on blocklists that only get updated every 12-24 hours is not good enough.<\/p>\n

– Only allow access to your crown jewel applications from managed devices, and ensure that your security strategy includes device posture checks to protect your sensitive data from attacks that start with credential theft.<\/p>\n

3. Lateral movement: <\/strong>When the attacker is in, they’re going to escalate their privileges and perform internal reconnaissance, usually starting with the Active Directory. Ransomware attackers will then propagate their ransomware payloads across your infrastructure in order to encrypt data. Utilize zero trust strategies to minimize access and limit the blast radius of these tactics.<\/p>\n

Key tips:<\/strong><\/p>\n

– Use ZTNA to maximize microsegmentation, connecting users only to one application at a time–never the network. <\/p>\n

– Ring-fence your applications with deceptive decoys that lure and confuse attackers, and that alert your SOC that malicious activity is underway.<\/p>\n

4. Data theft: <\/strong>In double extortion or encryption-less ransomware attacks, the threat actor will find valuable information and exfiltrate it to a command-and-control server or a file sharing site where they can then hold it for ransom.<\/p>\n

Key tips:<\/p>\n

– Know your data: use AI-powered data classification tools to tag sensitive data and give yourself visibility into its movement.<\/p>\n

– Inspect your outgoing traffic–again including encrypted channels–and utilize policies to stop data from leaving sanctioned storage locations.<\/p>\n

\u00a0\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

Post Content\u00a0\u00a0 \u200b Ransomware attacks (and all cyberattacks, generally) all […]<\/p>\n","protected":false},"author":0,"featured_media":1165,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1164","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zenith-zscaler"],"yoast_head":"\nRansomware Attacks on Gaming Industry - A CISO Perspective Deepen Desai - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Attacks on Gaming Industry - A CISO Perspective Deepen Desai\" \/>\n<meta property=\"og:description\" content=\"Post Content\u00a0\u00a0 \u200b Ransomware attacks (and all cyberattacks, generally) all […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-20T03:03:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Ransomware Attacks on Gaming Industry – A CISO Perspective Deepen Desai\",\"datePublished\":\"2023-09-20T03:03:55+00:00\",\"dateModified\":\"2023-09-20T03:03:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/\"},\"wordCount\":533,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg\",\"articleSection\":[\"Zenith: Zscaler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/\",\"name\":\"Ransomware Attacks on Gaming Industry - A CISO Perspective Deepen Desai - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg\",\"datePublished\":\"2023-09-20T03:03:55+00:00\",\"dateModified\":\"2023-09-20T03:03:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware Attacks on Gaming Industry – A CISO Perspective Deepen Desai\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ransomware Attacks on Gaming Industry - A CISO Perspective Deepen Desai - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Attacks on Gaming Industry - A CISO Perspective Deepen Desai","og_description":"Post Content\u00a0\u00a0 \u200b Ransomware attacks (and all cyberattacks, generally) all […]","og_url":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/","og_site_name":"JHC","article_published_time":"2023-09-20T03:03:55+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/"},"author":{"name":"","@id":""},"headline":"Ransomware Attacks on Gaming Industry – A CISO Perspective Deepen Desai","datePublished":"2023-09-20T03:03:55+00:00","dateModified":"2023-09-20T03:03:55+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/"},"wordCount":533,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg","articleSection":["Zenith: Zscaler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/","url":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/","name":"Ransomware Attacks on Gaming Industry - A CISO Perspective Deepen Desai - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg","datePublished":"2023-09-20T03:03:55+00:00","dateModified":"2023-09-20T03:03:55+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/09\/zscaler-logo-og-c0cAtd.jpeg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/ransomware-attacks-on-gaming-industry-a-ciso-perspective-deepen-desai\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Ransomware Attacks on Gaming Industry – A CISO Perspective Deepen Desai"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=1164"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1164\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/1165"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=1164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=1164"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=1164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}