Become a partner

DISCUSSION "Ransomware - Too Late to Cry over Spilt Milk, or How the Cataster Trained us"

Milan Pikula - Director , SK-CERT, National Security Authority · Michal Srnec - CISO, Aliter Technologies ·

Pay or not pay ransom in a ransomware attack? Experts agree: do not pay as a first response – it supports crime, does not guarantee the return of data, and can get you labeled a “payer.” The key is preparedness: incident response plans, solid backups, and sensible communication.

Pay the ransom? Why it’s smarter to say no

Among both governments and experts, a clear line prevails: do not pay the ransom. Slovakia subscribes to the principles of the Counter Ransomware Initiative, which points out that payment supports organized crime, with no guarantee of data return or deletion. Moreover, in some jurisdictions, sanctions may apply if the money ends up with sanctioned groups. From a game-theory perspective, trust in an attacker’s promises is weak – there is no certainty they won’t strike again.

Payment can open the door to repeated extortion or so‑called multi‑extortion, in which stolen data is traded. Even though there are exceptional situations where the economic balance tempts one to consider paying, the first step should be recovery on your own: restoring from backups, possibly using decryption tools, and assistance from expert teams. It is important to resist panic – incidents are not best handled “on the fly,” but according to a prepared procedure with a team that can withstand pressure.

Read more

Milan Pikula

SK-CERT
He was fortunate to not only witness the transformation of society from paper-based to information-based, but also to be directly involved in it. He has been active in cyber security, software development, Unix/Linux, and networks for 30 years. He currently leads SK-CERT, the national cyber security incident response unit. His most popular topic…

Michal Srnec

Aliter Technologies
He currently works as a CISO at Aliter Technologies, a.s. His professional journey began in the banking sector, where he led a team responsible for managing security tools. With over 10 years of experience in IT security and a PhD in applied informatics, he is a dedicated enthusiast of Information Security, IoT, Python programming, and cryptocur…

Recommendation speakers

Páčil sa ti článok? Zdieľaj ho a povedz o ňom aj ostatným