Implementing an Effective Defense Against Ransomware

Ransomware has become one of the fastest-growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar will answer these questions and more, providing expert advice on how to stop ransomware from infecting your critical systems and data --and what to do if your defenses fail.

On Demand
1h 00min

Attend this webinar, you'll:

  • Understand what basic security hygiene measures and endpoint protections will make you far more resistant to ransomware infection
  • Find out what to do and what NOT to do with backups, to soothe the sting of a possible ransomware infection
  • Know the risk factors to assess when deciding whether or not to pay a ransom request
  • Learn to identify the early warning signs that an attacker is planning to deploy ransomware on your systems, and stop them in their tracks

Featured Speakers

  • John Pironti
    John Pironti
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Eldad Gal
    Eldad Gal
    Cybersecurity Product Manager
    Deep Instinct

    Before starting his role as product manager at Deep Instinct, Eldad worked several years as a Security expert in Israeli national cyber security organization. After a joining a successful startup company he shifted to product management, a role he maintains for the last 7 years, helping cyber security vendors build leading Cybersecurity products. Eldad Holds a degree in Businesses and information technology.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By