Fraud Management & Cybercrime , Ransomware
Fighting Back Against Double Extortion and Data Exfiltration
Cohesity's Venkatesh and Zscaler's Grossenbacher on Distributed Data ManagementDouble-extortion ransomware attacks occur when attackers not only encrypt systems but also threaten to leak sensitive data unless a ransom is paid.
Organizations create and store vast amounts of backed-up or replicated data for various purposes such as disaster recovery and development testing, said Sheetal Venkatesh, senior director, product management, Cohesity. And double-extortion ransomware compounds the risk of data loss and data leakage.
"Data is no longer in your data center. It's everywhere - in OneDrive. It's being shared over email; it's in any public cloud deployment. You have to think about it from the perspective that, 'I no longer have the appliances in my data center. To secure this, I need to abstract data protection to a cloud format to be able to ubiquitously follow all the places that data can go,'" said Steve Grossenbacher, director, product marketing, Zscaler. "You need to think about it from a couple different perspectives."
In this video interview with Information Security Media Group at RSA Conference 2024, Venkatesh and Grossenbacher also discussed:
- Cohesity and Zscaler's collaboration to help customers address challenges in sensitive data exfiltration;
- The threat brought about by distributed data, including on-premises, public cloud and SaaS;
- AI-powered data classification for identifying sensitive data.
At Cohesity, Venkatesh leads product management for the data security product line. He has more than 20 years of experience spanning product management engineering and technical sales roles and a well-rounded background in cybersecurity and storage/availability domains.
Grossenbacher helps organizations securely transform their networks to a cloud-first architecture. Prior to Zscaler, he held marketing, competitive, sales engineering and technical support positions at McAfee and Xerox Engineering Systems. He has more than 20 years of experience in the network and security industries and has helped companies navigate the ever-changing world of IT.