2018 Global Report: Cryptocurrency’s Role In Cyber Attacks

Add bookmark

As ransomware continues to place added pressure on CISOs and the remaining enterprise security staffers, cryptocurrency payments appear to be the transaction method of choice. But the question remains: Do enterprises of all sizes – SMBs, large enterprise – hoard bitcoins so that their response time is minimal if they’re struck with a service-denying, data-stealing ransomware incident?

If organizations are not stockpiling Bitcoin or other cryptocurrencies to have at the ready in case they’re struck in a debilitating hack/breach, what are their other options? Do they negotiate with the malicious actors for different terms? Do they consult with a third-party incident response/forensics firm to conduct the correspondence and transaction(s)?

We have brought together four industry experts to provide an in-depth overview and analysis of burgeoning ransomware threats. Each has led various initiatives in the cyber and crypto spaces, and now they are imparting that wisdom to Cyber Security Hub’s readers. This report offers contributions from: Joseph Steinberg, a recognized cyber security thought leader and emerging technology influencer; Jim Mapes, former CISO for Trapp Technology and Founding Partner, Cyber Security Principal, IoT HomeLab; Thomas Pace, Senior Director, Worldwide Consulting, Cylance; and Robin Verderosa, Vice President of Product Marketing, BitGo. In this report, we cover:

• Ransomware & Cryptocurrency: How Two Intertwined Ecosystems Grow Together

• ‘Crypto-Haze’: Enterprise Policy Around Digital Currency Security

• Holistic Costs Associated With A Ransomware Attack

• Building A Better, More Secure Infrastructure To Invest In Digital Assets

 

Upcoming Events

Automotive Cyber Security, Connectivity & SDV Week 2025

18th - 20th November, 2025

Van der Valk Hotel Berlin Brandenburg, Germany

Automotive Cyber Security, Connectivity & SDV Week 2025

Digital Identity Week

1st - 2nd September 2026

Sydney, Australia

Digital Identity Week

Latest Webinars

From Dependencies to Defences: Navigating Software Supply Chain Security

2025-09-24

11:00 AM - 12:00 PM SGT

Learn how to defend your software supply chain from dependency threats and build resilient security...

Unpacking global regulatory frameworks to enhance third-party operational resilience

2024-11-14

11:00 AM - 12:00 PM EST

Join this webinar to explore the resilience-focused requirements of DORA, NIS2 and other global regu...

Preventing financial and reputational risk with process intelligence

2024-05-23

11:00 AM - 12:00 PM EDT

Learn how to manage risk stemming from poorly controlled processes in a collaborative way

Recommended