Panel: How Hackers Used and Abused the Pandemic to Profit
How Hackers Used and Abused the Pandemic to Profit
In a year like no other, the world has faced unprecedented change and challenges, with the impact of the COVID-19 pandemic affecting so many aspects of everyday life. During such a period of difficulty, scammers and malicious actors have sought to exploit the health crisis for their own means.
Whether it has been through targeting business support or tax relief schemes, bludgeoning healthcare organizations with attacks or seeking to sow the seeds of fear and doubt in vaccine efforts, fraudsters have implemented various techniques for profit and gain at the expense of a global community under immense pressure.
In this session, a panel of experts will reflect on the various ways in which hackers have targeted the pandemic over the past 12 months, lifting a lid on the methods employed and outlining how businesses and users can best protect themselves from ongoing COVID-related attacks, scams and fraudulent activity.
Key takeaways:
– How the COVID-19 pandemic has been maliciously exploited for profit and gain
– Insight into some of the standout criminal campaigns detected over the last year
– How the security community can help protect organizations as they recover from the pandemic
Similar Posts
Solving the Challenge of Multi-Factor Authentication Adoption
I was interviewed by Network World for this piece on MFA.
Data Privacy Day 2025: Insights from Over 50 Industry Experts
“To protect their personal data, consumers can take several practical steps to remove their information from data broker websites and opt-out of marketing. First, they should identify where their data is held by searching major data broker sites, public records, and credit reports. Once identified, consumers can use the “Opt Out” or “Remove My Data” links provided on these websites to submit removal requests, ensuring they confirm their identity and track the progress.
Additionally, they should familiarize themselves with regulations like the California Consumer Privacy Act (CCPA), which allows them to request the deletion of their personal data and opt-out of its sale. Consumers can also use online tools and services designed to automate the opt-out process from marketing lists and data brokers.
InfoSec Pros On the Road: Brenda Bernal, VP, Product Security and Compliance at Digicert
In this episode of InfoSec Pros On the Road at RSA 2024, I had the pleasure of interviewing Brenda Bernal, VP of Product Security and Compliance at Digicert. It was a great opportunity to finally meet Brenda in person after numerous Zoom calls. We discussed various topics, starting with the advancements in AI governance and the key risks organizations should focus on, including data privacy, security, and third-party risk management.
Brenda shared her insights on integrating AI into existing control frameworks and the importance of sustainability and adaptability in AI governance. She emphasized the need for transparency in AI implementations and how it parallels the evolution of ESG reporting.
We also explored the benefits of automation in GRC processes, drawing from Brenda’s experience as an external auditor and her current work with platforms like Hyperproof. The discussion highlighted the significant time savings and improved risk management that automation brings to compliance efforts.
Podcast: Telehealth: Emerging Security, Privacy Issues
“While the use of telehealth has surged during the COVID-19 pandemic, the data security and privacy concerns for both patients and healthcare providers have also increased, says cybersecurity strategist Kayne McGladrey”
Podcast: 2023: The Year of Risk
Tune into this ISACA Episode as Hyperproof’s Field CISO, Kayne McGladrey, speaks with ISACA’s Jeff Champion on how 2023 will be the year of risk.
Cyber Security Digital Summit Explores Who Owns Enterprise Security
Kayne sees a greater challenge educating younger generations about creating similar habits. How young is too young? “If you’re targeting high school-age students, you are probably too late. Focus on teaching healthy skepticism at middle school along with identifying phishing and the importance of updating devices with security patches.” The adage that if something is too good to be true, it probably is may not be familiar to this age group because they have not been personally impacted. “Question the benefit or reward claims made by a mobile game before it’s downloaded and installed. Be suspicious.”