EXECUTIVE SPEAKERS BUREAU
901-754-9404
My List0

We've now made it easier for you to research and save your favorite keynotes speakers. Click on the + sign to add a speaker to your Speaker List and email your favorites to colleagues and friends.

Insights Into the Gas Shortage and Future Prevention with Tyler Cohen Wood

Jessica Welch
Thursday, May 20, 2021
Book Now

On May 3rd the Colonial Pipeline shut down operations. The system that provides gas to 17 U.S. states and 50 million people had been hacked and the Colonial Pipeline was at the mercy of a cyber gang called the DarkSide. 

Gas shortages caused prices to surge across the eastern states and even left civilians stranded with no access to gas whatsoever. As panic spread, everyone began to wonder how internet hackers could collapse one of the U.S.’s largest economic entities. 

Former Senior Intelligence Officer and Deputy Cyber Division Chief for the Defense Intelligence Agency Tyler Cohen Wood knows this attack should not have been as impactful as it was. In an interview with Cohen Wood, she explains how and why this cyberattack was so detrimental and how we can protect ourselves from future attacks across all industries. 

Why this should never have happened

This has been the most disruptive cyberattack in the U.S. since the Solarwinds attack in 2020 that left over 18,000 Solarwind customers, including U.S. government agencies, vulnerable to the attacker’s malware. “I’m not sure what it’s going to take for people to realize how detrimental these attacks are. There were easy precautions that should have been put in place to prevent this attack,” Cohen Wood explains. 

“We don’t know how the system was first breached, but since over 90% of breaches are due to phishing, I would assume the ransomware was set off by an administrative employee clicking a phishing link that allowed DarkSide to make its way into the pipeline’s network.” 

Cybersecurity training that teaches employees to look out for phishing and other cyber attacks is a great place to start in protecting your company, but Cohen Wood knows we are all human. We can’t be vigilant all the time and mistakes are made by the average person. The weight of the repercussions of an attack shouldn’t fall on an individual. 

Cohen Wood says all companies should keep their private, important information on a network separate from the network employees function on and use daily. This separation will prevent hackers from reaching the mainframe even if a phishing attempt is successful. A lot of times, it’s as simple as that. 

Why we can’t let it happen again

Since about 2015, cybersecurity professionals have prophesied an attack like this. Things like the rise of phishing and its effectiveness, old legacy systems that aren’t equipped to handle attacks, and AI making hacking easier, have been raising red flags for years. 

But the public notoriously writes off cyber threats. Cohen Wood believes the public doesn’t take cybersecurity seriously because it has always felt distant to the average civilian. Many people think it will never affect them but, as we see with the Colonial Pipeline attack, we are one threat away from an economic shutdown. But the threat is also a lot closer to home than most think. 

Cohen Wood spent years working for the Department of Defense Intelligence Agency as Deputy Cyber Division Chief where they used cybersecurity to track down pedophiles and other malicious offenders hiding in plain sight. 

“I always go back to protecting the children because I saw firsthand how scary it really is. One criminal used the metadata from a mother’s social media picture of her daughter to find their address.” 

Cohen Wood also laid out a scenario in which a cyber attacker hacks into a hospital’s genetic data and uses the database to build a bioweapon that wipes out an entire demographic. While these facets of cybersecurity are less talked about, they are a fear that can be acted upon if we don’t take our cybersecurity seriously. 

How to protect yourself

  • Update your systems.

Many hackers target companies with old systems because they are more easily penetrated. A company will hold onto an old system for a number of reasons, but the most common is because it is too expensive or complicated to move their information and data from an old system to a new system. 

Cohen Wood reminds us, “Colonial Pipeline ended up paying $5 million in ransom to DarkSide. Although it may be expensive to switch systems it’s generally cheaper than paying ransom to buy back your company.”

  • Use separate networks

It is important to use separate networks within your company to silo out important information, and it’s just as important to do this at home. Cohen Wood recommends keeping your Alexa, smart alarm, personal computer, and any other personal devices on a separate network than your work computers. 

This way if your company is hacked your personal information is not jeopardized. 

  • Turn your social media on private 

Like Cohen Wood’s example earlier about pedophiles using social media to find children, other hackers use social media as well. Oftentimes, cyberattackers troll social media to find out valuable information about someone’s personal life and use it to guess passwords, find locations, and other nefarious things. 

The attack on the Colonial Pipeline was destructive and devastating, but Cohen Wood says “at least no one lost their life.” It can get a lot worse if we don’t start taking our cybersecurity seriously. It’s time we learn from those under attack and improve our systems to ensure a safer future. 

Comments

Leave a Comment

Recent Posts

blog-post-2

Unveiling the Future with Ben Hammersley . . .

Monday, April 29, 2024
blog-post-2

Sustainability Innovation: The Next Revo . . .

Monday, April 22, 2024
blog-post-2

Congratulations to Executive Speakers Bu . . .

Wednesday, April 17, 2024
MORE

Sign up for our Email Newsletter

FaceBook

Testimonials

Everyone on the ESB team has been great to work with for our events. Looking forward to keep working with ESB!

Plexus Worldwide

We had a positive experience with ESB. Matt Meyer is a great communicator and easy to get a hold of. His helped us through the process to mak..

BNSF

ESB was patient, thorough, and responsive during the planning process. Thank you for making this such a great experience for us!

ConnectWise

ESB supported our needs and the needs of our speaker throughout the entire process. I highly recommend working with ESB to find your next spe..

DogWatch

"It's always a pleasure to work with ESB. Very professional and personable staff. Thanks!"

Testimonial | Texas Society of Architects

"Excellent! Thank you for being a true partner to our organization and its development."

HCA Healthcare

"They are the only speakers bureau I will even consider using!"

Testimonial | Youth Villages

A wonderful bureau to work with! Big ups to everyone who helped make our event a success. Fingers crossed we get the chance to collaborate fo..

MDRT | Testimonial

"As always, you are the best most responsive speaker bureau I've ever worked with!"

Image Media

Angela Schelp was a great partner in finding the right kick-off speaker for our conference. This was my first conference identifying the keyn..

CubeSmart
Need Suggestions? Have Questions?

Need Suggestions? Have Questions?

Call to discuss how we can you help find the right speaker(s) for your organization.

© 2024 Executive Speakers Bureau. All Rights Reserved.

Design and Developed by eBiz Solutions

Get Ideas in 1 hour or less

Executive Speakers Bureau consistently receives praises about our speed and efficiency. From the beginning of your event planning, our extensive online speaker database and resourceful staff allow us to quickly equip you with the best speaker for your event.

Need a last minute speaker? No worries. Our speed and efficiency help us give you ideas for speakers in one hour or less.