{"id":56214,"date":"2020-07-13T07:35:25","date_gmt":"2020-07-13T07:35:25","guid":{"rendered":"https:\/\/www.eccu.edu\/?p=56214"},"modified":"2024-04-22T06:57:49","modified_gmt":"2024-04-22T06:57:49","slug":"anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline","status":"publish","type":"post","link":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/","title":{"rendered":"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"56214\" class=\"elementor elementor-56214\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-68d84c34 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"68d84c34\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-67132b37\" data-id=\"67132b37\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5152316c elementor-widget elementor-widget-text-editor\" data-id=\"5152316c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Date:<\/strong> December 2<sup>nd<\/sup>, 2021<br \/><strong>Time:<\/strong>\u00a09 AM MST \/ 9.30 PM IST<br \/><strong>Topic: <\/strong> Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline<\/p><p><a class=\"watch_now_btn elementor-button\" href=\"#watch\" target=\"_self\">Watch Now<\/a><\/p><p><strong>Abstract:<\/strong><\/p><p>The largest pipeline in the U.S., the Colonial Pipeline, was the target of a ransomware attack in May 2021, reportedly due to a single password leak. The attack that sent ripples of panic through the nation underscored the need for ethical hackers in the industry to safeguard businesses against cybercrime. While the demand for ethical hacking professionals has increased substantially over the last year, there is a persistent talent drought in the industry due to the lack of trained professionals specializing in protecting and defending the digital assets and infrastructure of organizations. Ethical hackers are increasingly sought after, and for those hoping to transition into the domain, gaining hands-on experience in ethical hacking opens the door to opportunities.<\/p><p>In this webinar, industry leaders analyze the impact of the Colonial Pipeline attack and discuss the skills that make ethical hackers invaluable.<\/p><p><strong>Key Takeaways:<\/strong><\/p><ul><li>Cybercrime<\/li><li>Ransomware Threats<\/li><li>Footprinting and Reconnaissance<\/li><li>Scanning Networks<\/li><li>Social Engineering<\/li><li>Sniffing<\/li><li>Pen testing<\/li><li>Malware Threats<\/li><li>Cloud Security<\/li><li>Edge Computing Security<\/li><\/ul><hr \/><p>\u00a0<\/p><h4>Panelists:<\/h4><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/SherriDavidoff.jpeg.webp\" alt=\"Sherri Davidoff\" width=\"200\" \/><\/p><p><strong>Sherri Davidoff,<\/strong> CEO, LMG Security<\/p><p><strong>Bio: <\/strong> Sherri Davidoff has been praised by <em>The New York Times<\/em> for her cybersecurity expertise and proactive data breach response. She was featured in the book <em>Breaking and Entering: The Extraordinary Story of a Hacker Called Alien<\/em>. A Computer Science and Electrical Engineering graduate from MIT, Sherri is currently the CEO of LMG Security and a GIAC-certified forensic examiner and pen tester. She authored the book <a href=\"https:\/\/www.pearson.com\/us\/higher-education\/program\/Davidoff-Data-Breaches-Crisis-and-Opportunity\/PGM334076.html\"><em>Data Breaches: Crisis and Opportunity<\/em><\/a>, and teaches the Data Breaches course at Black Hat. She is the coauthor of the noted security text, <a href=\"https:\/\/www.pearson.com\/us\/higher-education\/program\/Davidoff-Network-Forensics-Tracking-Hackers-through-Cyberspace\/PGM322390.html\"><em>Network Forensics: Tracking Hackers Through Cyberspace<\/em><\/a>, which is used as a textbook for many college cybersecurity courses. Sherri has conducted <a href=\"https:\/\/www.eccouncil.org\/\" target=\"_blank\" rel=\"noopener\">cybersecurity training<\/a> for many prominent organizations, including the Department of Defense, the American Bar Association, and FFIEC\/FDIC. She is a faculty member at the Pacific Coast Banking School.<\/p><p><img decoding=\"async\" class=\"alignleft size-full wp-image-2265\" src=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/MattDurrinHeadshot-scaled.jpg.webp\" alt=\"Matt Durrin\" width=\"200\" \/><\/p><p><strong>Matt Durrin, <\/strong> Director of Response &amp; Research, LMG Security<\/p><p><strong>Bio:<\/strong> A Computer Science graduate from the University of Montana, Matt Durrin is a seasoned forensics professional. He specializes in incident response, ransomware, cryptojacking, and banking trojans, and is the Director of Response and Research at LMG Security, where he manages the incident response and R&amp;D teams. Matt teaches courses on data breaches and ransomware at the international Black Hat U.S.A. conference. He worked as a defensive field technician and system administrator for more than 10 years. Matt conducts cybersecurity webinars and seminars for hundreds of attendees across a variety of sectors, including banking, retail, health care, government, and more. Recently, his malware research was featured on the NBC Nightly News.<\/p><p style=\"font-size: 10px; font-weight: bold;\">*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)<\/p><p><a name=\"attend\"><\/a><\/p><p><iframe src=\"https:\/\/attendee.gotowebinar.com\/register\/394795462042759691?source=eccu+webpage \" width=\"100%\" height=\"800\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Date: December 2nd, 2021Time:\u00a09 AM MST \/ 9.30 PM ISTTopic: Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline Watch Now Abstract: The largest pipeline in the U.S., the Colonial Pipeline, was the target of a ransomware attack in May 2021, reportedly due to a single password leak. The attack that sent ripples&hellip;<\/p>\n","protected":false},"author":32,"featured_media":79388,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_eb_attr":"","footnotes":""},"categories":[12482,12484],"tags":[],"class_list":{"0":"post-56214","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-talks","8":"category-recent-cybertalks"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.13 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline | EC-Council<\/title>\n<meta name=\"description\" content=\"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline explained by the Sherri Davidoff and Matt Durrin.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline\" \/>\n<meta property=\"og:description\" content=\"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline explained by the Sherri Davidoff and Matt Durrin.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/\" \/>\n<meta property=\"og:site_name\" content=\"Cybersecurity Exchange\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-13T07:35:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-22T06:57:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"465\" \/>\n\t<meta property=\"og:image:height\" content=\"310\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EC-Council\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EC-Council\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/\"},\"author\":{\"name\":\"EC-Council\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\"},\"headline\":\"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline\",\"datePublished\":\"2020-07-13T07:35:25+00:00\",\"dateModified\":\"2024-04-22T06:57:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/\"},\"wordCount\":486,\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg\",\"articleSection\":[\"Cyber Talks\",\"Recent Cybertalks\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/\",\"name\":\"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline | EC-Council\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg\",\"datePublished\":\"2020-07-13T07:35:25+00:00\",\"dateModified\":\"2024-04-22T06:57:49+00:00\",\"description\":\"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline explained by the Sherri Davidoff and Matt Durrin.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg\",\"width\":465,\"height\":310},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/cyber-talks\\\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Exchange\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Talks\",\"item\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/category\\\/cyber-talks\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#website\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"name\":\"Cybersecurity Exchange\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#organization\",\"name\":\"Cybersecurity Exchange\",\"url\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Cybersecurity Exchange\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.eccouncil.org\\\/cybersecurity-exchange\\\/#\\\/schema\\\/person\\\/8555903cd3282bafc49158c53da8f806\",\"name\":\"EC-Council\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline | EC-Council","description":"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline explained by the Sherri Davidoff and Matt Durrin.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/","og_locale":"en_US","og_type":"article","og_title":"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline","og_description":"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline explained by the Sherri Davidoff and Matt Durrin.","og_url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/","og_site_name":"Cybersecurity Exchange","article_published_time":"2020-07-13T07:35:25+00:00","article_modified_time":"2024-04-22T06:57:49+00:00","og_image":[{"width":465,"height":310,"url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg","type":"image\/jpeg"}],"author":"EC-Council","twitter_card":"summary_large_image","twitter_misc":{"Written by":"EC-Council","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/#article","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/"},"author":{"name":"EC-Council","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806"},"headline":"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline","datePublished":"2020-07-13T07:35:25+00:00","dateModified":"2024-04-22T06:57:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/"},"wordCount":486,"publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg","articleSection":["Cyber Talks","Recent Cybertalks"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/","name":"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline | EC-Council","isPartOf":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/#primaryimage"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg","datePublished":"2020-07-13T07:35:25+00:00","dateModified":"2024-04-22T06:57:49+00:00","description":"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline explained by the Sherri Davidoff and Matt Durrin.","breadcrumb":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/#primaryimage","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg","contentUrl":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-content\/uploads\/2023\/06\/Sherri-DavidoffMatt-Durrin-465x310-1.jpg","width":465,"height":310},{"@type":"BreadcrumbList","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/cyber-talks\/anatomy-of-the-ransomware-cyber-attack-on-the-u-s-colonial-pipeline\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.eccouncil.org\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Exchange","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/"},{"@type":"ListItem","position":3,"name":"Cyber Talks","item":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/category\/cyber-talks\/"},{"@type":"ListItem","position":4,"name":"Anatomy of the Ransomware Cyber Attack on the U.S. Colonial Pipeline"}]},{"@type":"WebSite","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#website","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","name":"Cybersecurity Exchange","description":"","publisher":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#organization","name":"Cybersecurity Exchange","url":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Cybersecurity Exchange"},"image":{"@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/#\/schema\/person\/8555903cd3282bafc49158c53da8f806","name":"EC-Council"}]}},"_links":{"self":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/users\/32"}],"replies":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/comments?post=56214"}],"version-history":[{"count":0,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/posts\/56214\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media\/79388"}],"wp:attachment":[{"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/media?parent=56214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/categories?post=56214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.eccouncil.org\/cybersecurity-exchange\/wp-json\/wp\/v2\/tags?post=56214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}