Three More Days to Get an iPad Air w/ Smart Keyboard with any 5 or 6 Day SANS Training - Register Today!


To attend this webcast, login to your SANS Account or create your Account.

This webcast has been archived. To view the webcast login into your SANS Portal Account or create an account by clicking the "Get Registered" button on the right. Once you register, you can download the presentation slides below.

Five Lessons Learned from Petya and WannaCry

  • Tuesday, July 11, 2017 at 10:30 AM EST (2017-07-11 14:30:00 UTC)
  • Jake Williams, Chris Wysopal


  • Veracode

You can now attend the webcast using your mobile device!



By now many organizations have dealt with the fallout from the recent Petya and WannaCry ransomware attacks. Both ransomware viruses appeared to target a vulnerability found in Microsoft Windows that was previously known and patched by Microsoft. However, some large organizations had not applied security updates on all their Windows computers and were unprepared to stop the attack.

Join Jake Williams of the SANS Institute and Chris Wysopal, CTO of Veracode as they discuss the assumptions that enterprises often make with regards to proactive measures around application security. Learn why endpoint security is not enough to protect against the activities of malware writers, why enterprises can't rely on patching alone to protect against future attacks, and other lessons to consider as the industry learns more about how ransomware attacks are architected and executed.

Speaker Bios

Chris Wysopal

Chris Wysopal is Co-Founder, Chief Technology Officer at Veracode, which he co-founded in 2006. He oversees technology strategy and information security. Prior to Veracode, Chris was vice president of research and development at security consultancy @stake, which was acquired by Symantec.

In the 1990's, Chris was one of the original vulnerability researchers at The L0pht, a hacker think tank, where he was one of the first to publicize the risks of insecure software. He has testified to the US Congress on the subjects of government security and how vulnerabilities are discovered in software.

Chris received a BS in computer and systems engineering from Rensselaer Polytechnic Institute. He is the author of The Art of Software Security Testing.

Chris is often called upon to download the latest Minecraft mods for his 6-year-old son. An avid photographer and nature-lover, Chris spends his free time hiking the many conservation trails near his home outside Boston.

Jake Williams

Jake Williams is a SANS analyst, senior SANS instructor, course author and designer of several NetWars challenges for use in SANS' popular, "gamified" information security training suite. Jake spent more than a decade in information security roles at several government agencies, developing specialties in offensive forensics, malware development and digital counterespionage. Jake is the founder of Rendition InfoSec, which provides penetration testing, digital forensics and incident response, expertise in cloud data exfiltration, and the tools and guidance to secure client data against sophisticated, persistent attacks on-premises and in the cloud.

Need Help? Visit our FAQ page or email

Not able to attend a SANS webcast? All Webcasts are archived so you may view and listen at a time convenient to your schedule. View our webcast archive and access webcast recordings/PDF slides.