{"id":3196,"date":"2025-06-11T13:45:18","date_gmt":"2025-06-11T11:45:18","guid":{"rendered":"https:\/\/insightevents.dk\/isc-cph\/?post_type=tec_session&#038;p=3196"},"modified":"2025-06-12T10:23:24","modified_gmt":"2025-06-12T08:23:24","slug":"detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure","status":"publish","type":"tec_session","link":"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/","title":{"rendered":"Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure"},"content":{"rendered":"<p><em>Technical Level: Intermediate \/ Advanced<\/em><\/p><p>Virtualization has become standard in OT networks, but it also introduces new risks. This session explores how ransomware groups increasingly target VMware-based infrastructures, exploiting poor segmentation and misconfigurations to breach OT systems. Drawing on real-world incident response cases, Truesec experts will share insights into ESXi-targeting ransomware, including the impact of Babuk source code leaks, malware TTPs, and recovery best practices. Attendees will gain actionable strategies to secure virtualized OT environments and prevent lateral movement across critical systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><em>Technical Level: Intermediate \/ Advanced<\/em><\/p>\n<p>Attendees will gain actionable strategies to secure virtualized OT environments and prevent lateral movement across critical systems.<\/p>\n","protected":false},"author":29,"featured_media":0,"template":"","meta":{"inline_featured_image":false,"footnotes":""},"session_track":[7],"session_location":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure - Industrial Security Conference Copenhagen<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure - Industrial Security Conference Copenhagen\" \/>\n<meta property=\"og:description\" content=\"Technical Level: Intermediate \/ AdvancedAttendees will gain actionable strategies to secure virtualized OT environments and prevent lateral movement across critical systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/\" \/>\n<meta property=\"og:site_name\" content=\"Industrial Security Conference Copenhagen\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-12T08:23:24+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/\",\"name\":\"Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure - Industrial Security Conference Copenhagen\",\"isPartOf\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\"},\"datePublished\":\"2025-06-11T11:45:18+00:00\",\"dateModified\":\"2025-06-12T08:23:24+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/insightevents.dk\/isc-cph\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/insightevents.dk\/isc-cph\/#website\",\"url\":\"https:\/\/insightevents.dk\/isc-cph\/\",\"name\":\"Industrial Security Conference Copenhagen\",\"description\":\"Industrial Security Conference Copenhagen\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure - Industrial Security Conference Copenhagen","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/","og_locale":"en_GB","og_type":"article","og_title":"Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure - Industrial Security Conference Copenhagen","og_description":"Technical Level: Intermediate \/ AdvancedAttendees will gain actionable strategies to secure virtualized OT environments and prevent lateral movement across critical systems.","og_url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/","og_site_name":"Industrial Security Conference Copenhagen","article_modified_time":"2025-06-12T08:23:24+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/","url":"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/","name":"Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure - Industrial Security Conference Copenhagen","isPartOf":{"@id":"https:\/\/insightevents.dk\/isc-cph\/#website"},"datePublished":"2025-06-11T11:45:18+00:00","dateModified":"2025-06-12T08:23:24+00:00","breadcrumb":{"@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/insightevents.dk\/isc-cph\/sessions\/detect-and-response-to-vmware-ransomware-attacks-important-take-aways-for-ot-infrastructure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/insightevents.dk\/isc-cph\/"},{"@type":"ListItem","position":2,"name":"Detect and Response to VMware ransomware attacks, important take-aways for OT infrastructure"}]},{"@type":"WebSite","@id":"https:\/\/insightevents.dk\/isc-cph\/#website","url":"https:\/\/insightevents.dk\/isc-cph\/","name":"Industrial Security Conference Copenhagen","description":"Industrial Security Conference Copenhagen","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/insightevents.dk\/isc-cph\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"_links":{"self":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3196"}],"collection":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions"}],"about":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/types\/tec_session"}],"author":[{"embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/users\/29"}],"version-history":[{"count":0,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/sessions\/3196\/revisions"}],"wp:attachment":[{"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/media?parent=3196"}],"wp:term":[{"taxonomy":"tec_track","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_track?post=3196"},{"taxonomy":"tec_location","embeddable":true,"href":"https:\/\/insightevents.dk\/isc-cph\/wp-json\/wp\/v2\/session_location?post=3196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}