Preparing For The Ransomware Onslaught -- Part 2: Ransomware Detection & Triage
Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.
John P. Pironti
IP Architects, LLC
John P. Pironti
John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 20 years. Mr. Pironti has a number of industry certifications including Certified in the Governance of Enterprise IT (CGEIT), Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information System Control (CRISC), Information Systems Security Architecture Professional and (ISSAP) and Information Systems Security Management Professional (ISSMP).
Mr. Pironti frequently provides briefings and acts as a trusted advisor to senior leaders of numerous organizations on information security and risk management and compliance topics and is also a member of a number of technical advisory boards for technology and services firms. He is also a published author and writer, highly quoted and often interviewed by global media, and an award winning frequent speaker on electronic business and information security and risk management topics at domestic and international industry conferences.
Senior Product Manager
Matthias Wollnik is a Senior Product Manager and brings over 15 years of storage and security experience to Code42's product organization. He came to Code42 from a product role at CrowdStrike, a leading cybersecurity company. Prior to that, Matthias drove a variety of security and storage technologies at Microsoft in their Windows and Windows Server divisions. He has a strong passion for technology and building products to make the lives of customers better.
Ransomware operators will always announce their presence, but not until after they’ve finished locking you out of your systems. There are, however, ways that you might be able to catch them in the act, if you know what to look for. However, when the ransomware sneaks by your steely-eyed gaze, there are questions you’ll need answers to: how long can your business survive without access to the locked systems? How up-to-date are your backups? Even if it’s hard to stomach, is the right decision simply to pay the ransom?
In this webinar, you’ll learn:
- how to detect some kinds of ransomware before they’ve completed encrypting your system
- how to quickly determine the extent of the damage
- how to assess the risk of paying a ransomware operator
Don’t miss the rest of the Dark Reading ransomware security trilogy, sponsored by Code42:
Part 1: Ransomware Prevention – Available On Demand
Part 3: Ransomware Remediation & Recovery, Tuesday, March 28