Ransomware Defense and Preparedness - Before the Attack

Ransomware is infecting more and more businesses each day – but there are ways to limit its impact. In this webinar top experts will discuss methods for preventing ransomware code from getting through your enterprise defenses, and how you can limit its reach.

On Demand
1h 00min

Attend this webinar and you'll:

  • Learn how ransomware is developed, how it is deployed, and how it evades standard IT security tools and defenses.
  • Hear about ransomware attackers – how they work, and their strategies for encrypting your data.    
  • Get techniques for stopping ransomware in its tracks before it can run rampant through your environment.

Other topics we'll cover include how the evolution of ransomworms changes - and doesn't change - your defense strategy, and what types of detection and segmentation technology can help find and contain ransomware infections before they shut down your enterprise.  We will also ponder the implications of ransomware operators who don't really care whether you pay the ransom or not and help you begin to prepare a ransomware action plan that goes beyond good backups and insurance policies

Featured Speakers

  • Erich Kron
    Erich Kron
    Security Awareness Advocate

    Erich Kron, Security Awareness Advocate at KnowBe4, is a veteran information security professional with over 20 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP and ITIL v3 certifications, among others. He has managed the technical integration and functional testing of multi-million-dollar enterprise level technology projects within the Department of Defense, as well as large military security programs. Erich has worked with information security professionals around the world to provide the tools, training and educational opportunities to succeed in the InfoSec industry.

  • John H Sawyer
    John H Sawyer
    Associate Director of Services
    IOActive, Inc

    John H. Sawyer is the red team lead and specializes in targeted attacks, social engineering, and post-exploitation. After more than 15 years in IT security experience, he’s a member of DEF CON 14’s and 15’s CTF winners ([email protected]), co-founder the University of Florida Student Infosec Team, and founder of SwampSec. John is a respected author and trainer for organizations including Dark Reading and InformationWeek Magazine, Interop, BruCON, OWASP AppSec DC, SANS, and B-Sides Jacksonville.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By