Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
    • Compliance & GRC
    • Endpoint Security
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud
  • Webinar Library
  • TiPs
  • DRAW

Cyber Resilience & Ransomware Response in Latin America

Veeam
05/12/2026
0
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


TL;DR

  • Latin American organizations face ransomware attacks through three primary vectors: phishing/smishing campaigns, credential compromise, and exploitation of unpatched software vulnerabilities, with over 90% of attacks targeting both production systems and backup repositories.
  • Banco de la Vivienda's operational experience demonstrates that immediate restoration from tested backups proves faster and more cost-effective than troubleshooting in 95% of incidents, with the bank performing 300+ unplanned restorations monthly across 1,600 infrastructure components.
  • The regulatory landscape is evolving rapidly across Latin America, with Chile establishing the region's first comprehensive cybersecurity agency in 2024, while most countries now mandate breach reporting and require multi-factor authentication as a standard audit requirement.
  • Emerging threats include ransomware-as-a-service platforms, AI-powered social engineering attacks, and voice phishing campaigns, requiring organizations to combine robust backup infrastructure with regular testing, security integration, and continuous user education.
  • Enterprise backup strategies must account for multi-cloud environments and treat backup platforms as comprehensive security tools rather than basic utilities, with close collaboration required between backup and security teams during incident response.

Ransomware Attack Vectors and Regional Threats

The panel opens with a comprehensive overview of the three primary ransomware attack vectors affecting Latin American organizations: phishing campaigns (including SMS-based smishing attacks), credential compromise through brute force or social engineering, and exploitation of unpatched software vulnerabilities. The discussion emphasizes that ransomware attacks in the region follow global patterns, with over 90% of incidents targeting both production systems and backup repositories. Notable regional cases are examined, including attacks on IFX, GTD, and the Costa Rican government, many of which exploited VMware ESX/ESXi vulnerabilities. The speakers stress that attacks typically occur during long weekends when IT staff availability is reduced, and increasingly involve double extortion tactics combining data encryption with exfiltration threats.

Enterprise Backup Strategy and Recovery Operations

Marcelo Clavijo from Banco de la Vivienda shares operational insights from managing 1,600 infrastructure components across Colombia with backup retention policies ranging from one month to ten years for compliance requirements. The bank performs an average of 300 unplanned restorations monthly, with peak days reaching 20 restorations. This real-world experience demonstrates a critical operational shift: in 95% of incidents, immediate restoration from backup proves faster and more cost-effective than troubleshooting with vendors. The discussion highlights the importance of regular restoration testing, which is mandated by SOX compliance and local regulators, and emphasizes that backup teams must work closely with security teams during incident response. The panel stresses that modern backup strategies must account for multi-cloud environments, with many Latin American enterprises now operating across three or more cloud providers to optimize latency and costs.

Regulatory Landscape and Security Best Practices

The conversation addresses the evolving regulatory environment across Latin America, with Chile leading the region by establishing the first comprehensive cybersecurity agency and legislation in 2024. Most Latin American countries have signed the Budapest Convention on Cybercrime and are implementing mandatory breach reporting requirements. The panel emphasizes critical security fundamentals: implementing multi-factor authentication (now a standard audit requirement), regular password rotation, maintaining air-gapped or immutable backups, and ensuring backup encryption to prevent data exposure. The speakers discuss the importance of incident response planning that goes beyond traditional disaster recovery, noting that forensic analysis must be completed before restoration to prevent reinfection. Veeam's integration of threat detection capabilities through tools like Coveware and the Recona Scan engine provides additional layers of defense, though the panel stresses these complement rather than replace dedicated security tools.

Emerging Threats and Organizational Preparedness

The discussion concludes with observations on emerging threat trends, including ransomware-as-a-service and phishing-as-a-service platforms that lower the barrier to entry for cybercriminals. The panel notes sophisticated attacks now employ AI-powered chatbots for social engineering, searching for employees who maintain password spreadsheets or other security weaknesses. Voice phishing (vishing) attacks are increasing in Chile and other markets, with attackers recording victim voices for authentication bypass. The speakers emphasize that user education remains critical, as human error continues to be a primary vulnerability. Organizations are advised to leverage all available backup platform capabilities rather than treating enterprise backup solutions as basic tools, with one panelist comparing underutilization to buying a Ferrari for grocery shopping. The session reinforces that cyber resilience requires a combination of robust backup infrastructure, regular testing, security integration, regulatory compliance, and continuous user awareness training.

Chapters

0:00 - Welcome and Speaker Introductions
4:21 - Ransomware Attack Vectors Overview
9:04 - Attack Execution and Double Extortion
12:01 - Backup Strategy and Recovery Planning
18:04 - Enterprise Backup Operations at Scale
27:38 - VMware Vulnerabilities and Regional Cases
31:52 - Restoration vs. Troubleshooting Economics
36:00 - Proactive Security and Threat Detection
41:04 - Secure by Design and Vendor Transparency
43:44 - Best Practices and User Education

Key Quotes

5:54 "Tres formas principales. Número uno, phishing. Todos esos e-mails que recibimos. Segunda es acceso, acceso a las credenciales, acceso a los usuarios y a los passwords. Y el número tres es explotar vulnerabilidades en el software."
9:43 "... 96%, arriba del 90% de los casos no solo van a tratar de ir hacia los datos de producción, pero también hacia los respaldos ya a los backups."
20:19 "Tenemos unas 1600 componentes de infraestructura solamente en Colombia en un premio bajo respaldo y tenemos unas políticas que van prácticamente desde un mes hasta más o menos unos 10 años por compliance."
31:52 "Más o menos el 95% de las veces nos haría más barato hacer un restoro. Tú puedes tener a todo el equipo de ingeniería, mientras tanto, coge la máquina de tal día, la restauras y ya se acabó. Tengo servicio."
33:09 "Nosotros hay días que hacemos 20 restauraciones en un día. Y en el mes más barato, digamos así que es febrero, hacemos 300 restauraciones y son 300 restauraciones no programadas."
27:46 "Hay una vulnerabilidad ahí que se sigue explotando en todo el mundo en esas versiones y lo que hacen es con esto entrar, tomar acceso a los VMWare y tomar control por completo."

Categories:
  • » Data Protection » Backup & Recovery
  • » Data Protection
Channels:
News:
Events:
Tags:
  • Data Protection
  • Backup & Recovery
  • Security Operations
  • Compliance & Governance
  • Panel
  • Customer Story
  • Best Practices
  • Ransomware Response
  • Backup and Recovery
  • Cyber Resilience
  • Latin America Cybersecurity
  • Incident Response Planning
  • Compliance and Auditing
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated
  •  

              Video's comments: Cyber Resilience & Ransomware Response in Latin America

              Upcoming Webinar Calendar

              • 05/12/2026
                11:30 PM
                05/12/2026
                Implementing Effective Strategies for Active Directory Security and Data Protection
                https://www.truthinit.com/index.php/channel/1888/implementing-effective-strategies-for-active-directory-security-and-data-protection/
              • 05/13/2026
                01:00 AM
                05/13/2026
                Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage
                https://www.truthinit.com/index.php/channel/1890/transforming-the-black-box-reveal-hidden-threats-and-ai-risks-through-data-lineage/
              • 05/13/2026
                05:00 AM
                05/13/2026
                Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage
                https://www.truthinit.com/index.php/channel/1894/transforming-the-black-box-revealing-ai-risks-and-hidden-threats-through-data-lineage/
              • 05/19/2026
                01:00 PM
                05/19/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases
                https://www.truthinit.com/index.php/channel/1936/establishing-a-robust-ai-governance-framework-for-genai-throughout-deployment-phases/
              • 05/20/2026
                08:00 AM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1937/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/20/2026
                10:00 PM
                05/20/2026
                Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle
                https://www.truthinit.com/index.php/channel/1953/establishing-a-robust-ai-governance-framework-for-genai-throughout-its-lifecycle/
              • 05/21/2026
                11:00 AM
                05/21/2026
                The Autonomous Era: Orchestrating a Resilient Enterprise
                https://www.truthinit.com/index.php/channel/1372/the-autonomous-era-orchestrating-a-resilient-enterprise/
              • 05/27/2026
                04:00 AM
                05/27/2026
                Rivoluziona i rischi dell'AI in opportunità con Netskope AI Security
                https://www.truthinit.com/index.php/channel/1925/rivoluziona-i-rischi-dellai-in-opportunità-con-netskope-ai-security/
              • 05/27/2026
                10:00 AM
                05/27/2026
                Adopting AI: From Illusion to Intentional Control
                https://www.truthinit.com/index.php/channel/1924/harnessing-ai-transitioning-from-illusion-to-purposeful-mastery/
              • 05/28/2026
                01:00 PM
                05/28/2026
                Harnessing AI for Smaller Teams: Strategies for Secure Implementation
                https://www.truthinit.com/index.php/channel/1951/harnessing-ai-for-smaller-teams-strategies-for-secure-implementation/
              • 06/02/2026
                01:00 PM
                06/02/2026
                Spring of Satori: Delving into Recent Findings and the 2026 Threat Landscape
                https://www.truthinit.com/index.php/channel/1930/spring-of-satori-delving-into-recent-findings-and-the-2026-threat-landscape/
              • 06/04/2026
                02:00 AM
                06/04/2026
                Mastering the Unseen: Managing Shadow AI and Agentic MCP Traffic
                https://www.truthinit.com/index.php/channel/1948/mastering-the-unseen-managing-shadow-ai-and-agentic-mcp-traffic/
              • 06/16/2026
                07:00 AM
                06/16/2026
                Transforming Data Risk into Actionable Priorities: Essential Fixes First
                https://www.truthinit.com/index.php/channel/1952/transforming-data-risk-into-actionable-priorities-essential-fixes-first/

              Upcoming Events

              • May
                12

                Implementing Effective Strategies for Active Directory Security and Data Protection

                05/12/202611:30 PM ET
                • May
                  13

                  Transforming the Black Box: Reveal Hidden Threats and AI Risks through Data Lineage

                  05/13/202601:00 AM ET
                  • May
                    13

                    Transforming the Black Box: Revealing AI Risks and Hidden Threats through Data Lineage

                    05/13/202605:00 AM ET
                    • May
                      19

                      Establishing a Robust AI Governance Framework for GenAI Throughout Deployment Phases

                      05/19/202601:00 PM ET
                      • May
                        20

                        Establishing a Robust AI Governance Framework for GenAI Throughout Its Lifecycle

                        05/20/202608:00 AM ET
                        More events
                        Truth in IT
                        • Sponsor
                        • About Us
                        • Terms of Service
                        • Privacy Policy
                        • Contact Us
                        • Preference Management
                        Desktop version
                        Standard version