Preparing For The Ransomware Onslaught -- Part 1: Ransomware Prevention

Preparing For The Ransomware Onslaught -- Part 1: Ransomware Prevention

 

Available On Demand
Duration 1h 0min
Speakers
Sara Peters
Contributing Editor
Dark Reading
Sara Peters
Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.
Gal Shpantzer
Independent
Security Consultant
Gal Shpantzer
Gal Shpantzer has over 15 years of experience as an independent security professional and is a trusted advisor to CISOs of large corporations, technology and pharma startups, Ivy League universities and non-profits/NGOs. Since 2014, Gal has focused on emerging threats to availability as well as confidentiality (ransomware and destructive attacks). Gal has been involved in multiple SANS Institute projects since 2002, including co-editing the SANS Newsbites, revising the E-Warfare course and presenting on cyberstalking, CAPTCHAs, endpoint security and hardware roots of trust. In 2009, he founded and led the privacy subgroup of the NIST Smart Grid cybersecurity task group, resulting in the privacy chapter of NIST IR 7628. He is a co-author of the Managing Mobile Device Security chapter in the 6th ed. Vol 4 of the Information Security Management Handbook (2010) with the late Dr. Eugene Schultz, and is a technical editor of an upcoming O'Reilly book on defensive security (2017). Gal collaborated with Dr. Christophe Veltsos to present the ongoing Security Outliers project, focusing on the role of culture in risk management at RSA, CSI, BSides and Baythreat conferences. Most recently, he was involved as a subject matter expert in the development of the U.S. Department of Energy’s Electric Sector Cybersecurity Capability Maturity Model (ESC2M2) in 2012, and is launching the Incident Response Execution Standard project late 2016. Gal was also involved in the Infosec Burnout research project and co-presented on this topic at BSides-Las Vegas and RSA.

In the past year, many enterprises have been attacked by cybercriminals who encrypted their data – and demanded money to decrypt it. This “ransomware” is infecting more and more businesses each day – but there are ways to limit its impact.

In this webinar – part of a three-part series of webinars on ransomware – top experts will discuss methods for preventing ransomware code from getting through your enterprise defenses, and how you can limit its reach. You’ll learn how ransomware is developed, how it is deployed, and how it evades standard IT security tools and defenses. You’ll hear about ransomware attackers – how they work, and their strategies for encrypting your data. Most importantly, you’ll learn techniques for stopping ransomware in its tracks before it can run rampant through your environment.

Of course, the best security teams are the ones who are prepared for the days when their best security preventions fail. So don’t miss the rest of the Dark Reading ransomware security trilogy, sponsored by Code42:

Part 2: Ransomware Detection & Triage, Thursday, Feb. 23

Part 3: Ransomware Remediation & Recovery, Tuesday, March 28

Already a member? Login