How to Be Ready for Ransomware
You may wish for the days when ransomware attackers just used some malware, encrypted data, and asked you for Bitcoin. Supply chain attacks, doxing and blackmail threats, intellectual property theft, and inventive ransom requests that have deep business consequences, are now part and parcel of the attacker toolbox. How are IT leaders supposed to prepare for such complex threats?
In this virtual event, presented by ITPro Today and InformationWeek, get a better picture of today’s threat landscape; learn what tools and techniques can best help your organization detect and prevent these attacks; design a thorough incident response plan that will help your organization survive a successful attack intact; and be prepared with a fast answer to the age-old question: “to pay or not to pay?”
Sad but true: new ransomware attack tactics mean your current backup and restore strategy may no longer suffice. Cyber resilience now requires intelligence and agility—in the backup process, in intrusion and malware detection, and in rapidly learning (and applying) lessons from successful intrusions. This keynote from Curtis Franklin, Omdia’s Security Operations senior analyst, will teach you how to stay one step ahead of increasingly sophisticated threat actors.
Fireside chat with Fortinet
Sooner or later, your business will fall prey to a ransomware attack—then what? Fortunately, there are tried-and-true tactics for recovering from these attacks. In this action-packed keynote, we’ll cover how to handle a ransomware attack from start to finish, including how to develop an incident recovery plan, the latest in data backup and restoration, and how a list of internal and external contacts can expedite recovery.
Fireside Chat with Mandiant
We thought it was bad enough when traditional ransomware started to steal data in its second generation of evolution, now dubbed “double extortion”. The third stage of ransomware is beginning to happen now and will make us wish for the good, old days of Ransomware 2.0.
Attend this presentation to learn how ransomware is evolving to inflict maximum damage and more importantly how to protect yourself and your organization.
Roger A. Grimes, Data-Driven Defense Evangelist at KnowBe4, was among the first to warn the world about Ransomware 2.0 – the almost accidental attacks that became a storm.
Here is his latest early warning.
In this webinar you’ll learn:
Don’t become another statistic. Stay one step ahead of cybercriminals!
46% of organizations have already deployed artificial intelligence (AI) and machine learning (ML) technologies to bolster cybersecurity. Yet, are they using AI and ML in the most effective ways?
Join this webinar with Brian Pinnock, Mimecast Cybersecurity Expert to explore:
* Why organizations are using or plan to use AI and ML
* How AI and ML reduce stress on limited resources, and
* How threat actors are increasingly using AI and ML for sophisticated attacks like ransomware
A ransomware event takes place every 11 seconds. In 2021, 68% of US organizations paid the ransom, but only 65% got their data back. Learn how you can avoid adding to that statistic, and along the way protect against accidental deletion and insider threats. Understand best practices illustrated with real world customer examples.
Ransomware is the biggest threat to all organizations of every size and every industry. The frequency and severity of attacks is ever increasing and the unprepared are paying ransoms of millions and ending up in the news. It is vital to understand how your organization can recover rapidly from any attack to avoid disruption without paying a ransom.
Join Chris Rogers from Zerto, a Hewlett Packard Enterprise company to learn more about:
The FBI discourages organizations from paying ransoms, but many victims end up doing so, especially when the costs of a prolonged attack stand to outweigh the ransom amount. Whether to pay or not depends on a number of complex factors. Listen as our panel of security experts discuss the risks of paying, how paying impacts organizations, and the best ways to prevent ransomware attacks to begin with.
Session Views
Zone Visits
Chats Attended
Resources Viewed
vCards Exchanged