Critical Infrastructure Security , Cybercrime , Cyberwarfare / Nation-State Attacks

Verizon Breach Report: Ransomware, Phishing and Top Trends

Verizon's Chris Novak Discusses Highlights From 2021 Breach Investigations Report
Chris Novak, global director, Threat Research Advisory Center, Verizon Business Group

Ransomware attacks have evolved over the years as attackers have come out with new strategies for digital extortion, says Chris Novak, global director of the Threat Research Advisory Center at Verizon Business Group.

See Also: The Healthcare CISO’s Guide to Medical IoT Security

"We are now starting to see third-party extortion. This is where they [hackers] hold your system hostage, steal your data, not only ask you to pay ransom but go through your data and ask your vendors/partners also to pay ransom," says Novak.

In a video interview with Information Security Media Group, Novak provides insights for the global market on the new Verizon 2021 Data Breach Investigations Report. He discusses:

  • Highlights of the data breach investigations report;
  • New trends in ransomware;
  • How the threat landscape will likely evolve in 2022.

Novak is a co-founder and the global director of the Verizon Threat Research Advisory Center. He is an internationally recognized expert in the field of incident response and computer forensics and has been involved with information security for more than 15 years. Novak has assisted corporations, government agencies and attorneys with all matters involving computer forensics, fraud investigations and crisis management.


About the Author

Suparna Goswami

Suparna Goswami

Associate Editor, ISMG

Goswami has more than 10 years of experience in the field of journalism. She has covered a variety of beats including global macro economy, fintech, startups and other business trends. Before joining ISMG, she contributed for Forbes Asia, where she wrote about the Indian startup ecosystem. She has also worked with UK-based International Finance Magazine and leading Indian newspapers, such as DNA and Times of India.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.