Current Time 0:00
Duration -:-
Loaded: 0%
Stream Type LIVE
Remaining Time -:-
 
1x
  • Chapters
  • descriptions off, selected
  • captions off, selected
      G      
    Date
    Summary
    Chris Pierson Appears on ‘Trading 360’ To Discuss Cybersecurity
    Source
    Schwab Network

    Name: Schwab Network

    URL: https://schwabnetwork.com/

    Show
    Trading 360 (Schwab Network)

    Name: Trading 360 (Schwab Network)

    URL: https://schwabnetwork.com/shows/trading-360

    Persons
    Nicole Petallides

    Name: Nicole Petallides

    Employment: FOX Business Network (FBN)

    Position: Anchor

    , Chris Pierson

    Name: Chris Pierson

    Employment: BlackCloak

    Position: Founder & CEO

    Event
    Event location
    Link
    Uploaded
    06/25/2024 11:56 am
    Owner
    Type
    Video
    Format
    MP4 (1280x720) Use clipper to adjust file type
    Duration
    0:06:09
    Views
    2
    Purchases
    0
    Transcript
    RUSH TRANSCRIPT Our three ░░░░░░░░ round and we re ░░░░░░░░ at cyber security Of ░░░░░░░░ you may have heard ░░░░░░░░ some of these automakers ░░░░░░░░ a software hack and ░░░░░░░░ went up pen and ░░░░░░░░ What get Let s ░░░░░░░░ more about this doctor ░░░░░░░░ cloak gordon wasson see ░░░░░░░░ I can see I ░░░░░░░░ thinking about for being ░░░░░░░░ us Cd k global ░░░░░░░░ this cyber attack on ░░░░░░░░ software platform a ransom ░░░░░░░░ gordon What did you ░░░░░░░░ of this Continuous and ░░░░░░░░ we re seeing where ░░░░░░░░ doctors have access to ░░░░░░░░ that sophisticated rents more ░░░░░░░░ which they re able ░░░░░░░░ get off the dark ░░░░░░░░ they re targeting industries ░░░░░░░░ automotive where there s ░░░░░░░░ single point of failure ░░░░░░░░ the supply chain and ░░░░░░░░ re able to hold ░░░░░░░░ for ransom Eight figure ░░░░░░░░ it could take down ░░░░░░░░ thousands of car dealerships ░░░░░░░░ them from not only ░░░░░░░░ cars and in voicing ░░░░░░░░ customers and getting the ░░░░░░░░ required But it s ░░░░░░░░ disrupted the car dealerships ░░░░░░░░ being able to order ░░░░░░░░ So this trend is ░░░░░░░░ to continue There s ░░░░░░░░ billion dollars paid out ░░░░░░░░ 20 twenty three and ░░░░░░░░ expect that trend to ░░░░░░░░ and 20 twenty four ░░░░░░░░ news pertaining to this ░░░░░░░░ that we re back ░░░░░░░░ back up systems where ░░░░░░░░ more advanced than they ░░░░░░░░ been in years prior ░░░░░░░░ some of the stuff ░░░░░░░░ more recover of all ░░░░░░░░ easily recovered and as ░░░░░░░░ result maybe that ransom ░░░░░░░░ wouldn t have to ░░░░░░░░ paid in the same ░░░░░░░░ It has in years ░░░░░░░░ That cybercriminals are going ░░░░░░░░ attack by any means ░░░░░░░░ they re going to ░░░░░░░░ directly companies extorting them ░░░░░░░░ ransom sinking financial gain ░░░░░░░░ so rural apart property ░░░░░░░░ they re also going ░░░░░░░░ go through third party ░░░░░░░░ attacks We ve seen ░░░░░░░░ pattern happened time and ░░░░░░░░ again We just saw ░░░░░░░░ recent Lee largest one ░░░░░░░░ with solar winds and ░░░░░░░░ you re seen it ░░░░░░░░ terms of cd k ░░░░░░░░ one software company that ░░░░░░░░ used by thousands of ░░░░░░░░ this case 15 thousand ░░░░░░░░ dealerships and you can ░░░░░░░░ massively impact those actual ░░░░░░░░ You can more massively ░░░░░░░░ the speed of negotiations ░░░░░░░░ you re going to ░░░░░░░░ offline for a longer ░░░░░░░░ of time and potentially ░░░░░░░░ the company has an ░░░░░░░░ risk What was very ░░░░░░░░ about this attack is ░░░░░░░░ it seems like or ░░░░░░░░ the fences here this ░░░░░░░░ like there is some ░░░░░░░░ paid on resiliency The ░░░░░░░░ is trying to reconstitute ░░░░░░░░ using backups using alternative ░░░░░░░░ to get the software ░░░░░░░░ up and running But ░░░░░░░░ course it s been ░░░░░░░░ for about seven days ░░░░░░░░ it seems like probably ░░░░░░░░ few more days are ░░░░░░░░ store but we have ░░░░░░░░ go into focus on ░░░░░░░░ and depends what we ░░░░░░░░ to really make sure ░░░░░░░░ we re all wind ░░░░░░░░ on how to react ░░░░░░░░ to reconstitute systems how ░░░░░░░░ rebuild in a quick ░░░░░░░░ swift manner About what ░░░░░░░░ the lines of defense ░░░░░░░░ at now ask you ░░░░░░░░ I mean every industry ░░░░░░░░ sort of vulnerable right ░░░░░░░░ this point and so ░░░░░░░░ you know why do ░░░░░░░░ feel compelled to come ░░░░░░░░ here and talk about ░░░░░░░░ overall What is it ░░░░░░░░ you want people to ░░░░░░░░ now about the cyber ░░░░░░░░ For their businesses for ░░░░░░░░ or think they call ░░░░░░░░ re you re you ░░░░░░░░ right on track Here ░░░░░░░░ company is vulnerable to ░░░░░░░░ sorts of attacks and ░░░░░░░░ will we tell folks ░░░░░░░░ the first off any ░░░░░░░░ in about how large ░░░░░░░░ small you are You ░░░░░░░░ to have a a ░░░░░░░░ defensive strategy that involves ░░░░░░░░ a man service writer ░░░░░░░░ bang or says p ░░░░░░░░ could we could look ░░░░░░░░ your endpoints Did the ░░░░░░░░ your employers use and ░░░░░░░░ sure that there aren ░░░░░░░░ intrusions taking place You ░░░░░░░░ use cyber training and ░░░░░░░░ tell your employees that ░░░░░░░░ something looks suspicious Well ░░░░░░░░ s a phishing email ░░░░░░░░ it s a text ░░░░░░░░ it s a phone ░░░░░░░░ They get never give ░░░░░░░░ those credentials never give ░░░░░░░░ up that Attacks are ░░░░░░░░ and normally that the ░░░░░░░░ are perpetrated see U ░░░░░░░░ They are now calling ░░░░░░░░ to the dealerships and ░░░░░░░░ to do secondary and ░░░░░░░░ attacks where they re ░░░░░░░░ for those usernames passwords ░░░░░░░░ employees trying to perpetuate ░░░░░░░░ attack and keep it ░░░░░░░░ so employees to be ░░░░░░░░ vigilant Companies need to ░░░░░░░░ to invest in their ░░░░░░░░ and get experts and ░░░░░░░░ to help them build ░░░░░░░░ that resiliency Security companies ░░░░░░░░ strike which actually was ░░░░░░░░ recently added to the ░░░░░░░░ Five hundred forty and ░░░░░░░░ palo alto see scalar ░░░░░░░░ Chris Paris parasite final ░░░░░░░░ here on you mention ░░░░░░░░ of the defenses that ░░░░░░░░ can take Here today ░░░░░░░░ talk about the cyber ░░░░░░░░ which obviously just stop ░░░░░░░░ in it s tracks ░░░░░░░░ a company like an ░░░░░░░░ company can t order ░░░░░░░░ s parts can t ░░░░░░░░ it s business I ░░░░░░░░ stopped right There Day ░░░░░░░░ need to right there ░░░░░░░░ different sectors doing different ░░░░░░░░ They have different products ░░░░░░░░ services that they provide ░░░░░░░░ need to take a ░░░░░░░░ back Every single company ░░░░░░░░ exists right now is ░░░░░░░░ some type of us ░░░░░░░░ company There s this ░░░░░░░░ plane that traverses everything ░░░░░░░░ what we do in ░░░░░░░░ creates is playing field ░░░░░░░░ which you have to ░░░░░░░░ proper defense You have ░░░░░░░░ have proper reconstitution if ░░░░░░░░ proper remediation you have ░░░░░░░░ actually tackle cybersecurity.
    To view this clip's transcript, log into your Grabien account.