A U.S. pipeline company that operates the largest gasoline conduit on the East Coast was recently the victim of a ransomware attack. The attack appears to have only affected IT networks, however it may have had the potential to spread to the OT environment. As a safety maneuver, the company took the additional precaution of shutting down systems that control the pipeline. This safeguard, however, caused a spike in fuel prices.
IBM Security is here to provide you more information about the attack and answer any questions you may have. Join our webinar Thursday May 13th at 9:30 am ET to learn more about:
Charles Henderson is the Global Head of IBM's X-Force Red. Charles and his team specialize in network, application, physical, and device penetration testing as well as vulnerability research. Charles has also presented his research at a number of global conferences, including RSA, Black Hat, and DEF CON.
Nick Rossmann is the Global Lead for X-Force Threat Intelligence. His teams hunt for evil and reverse engineer malware. Nick works closely with offering management across IBM Security to integrate threat intelligence into the portfolio.
Prior to IBM, Nick was a senior manager for intelligence production at FireEye where he coordinated research, including assessments about China, Russia, cybercriminals and ICS vulnerabilities. Nick was an intelligence analyst on Middle East issues at the CIA, and also worked at the FBI and Department of Defense. He’s a graduate of the Maxwell School at Syracuse University. Nick attended the National Intelligence University. He’s currently earning his Executive Master of Science in Information Management from the iSchool at Syracuse University.
John is a hacker and Regional Leader for X-Force Red in Latin America. He started his career at PwC performing risk assessments to align with the NIST Cybersecurity and ISO 27001 frameworks. John then transitioned into offensive security as a subject matter expert in network and human-based assessments. John worked as Global Manager of Cybersecurity Investigations at a Fortune 500 life sciences company where he oversaw the in-house red team. John is also a former United States Naval officer. He is OSCP-certified and has significant experience in red teaming, network penetration testing, web application testing, physical assessments and social engineering.