Research Reveals Best Practices in Ransomware Response & Negotiation

Event Time

Originally Aired - Monday, September 12 10:00 AM - 11:00 AM Eastern Time (US & Canada)

Info Alert

Create or Log in to My Show Planner to see Videos and Resources.




Log in to your planner to join the zoom meeting!




Info Alert

You do not have access to this session's resources.

Info Alert

This Session Has Not Started Yet

Be sure to come back after the session starts to have access to session resources.

Event Location

Location: B316

Event Information

Title: Research Reveals Best Practices in Ransomware Response & Negotiation


New research that analyzes ransomware victims' support chats will give you a behind-the-scenes peak at what is really happening during these negotiations. This session will identify the trends and commonalities across several actors and affiliates and offer guidance for organizations based on what we uncovered after analyzing victim support chats for five ransomware families. We will share six steps you can take to help your organization avoid becoming a victim of a ransomware attack and offer advice on what you should do if you do become one. Understanding what exactly victims go through during the aftermath and recovery process of a ransomware attack can help anyone who finds themselves in a similar situation.            

  • Participants will discover how to employ best practices for keeping servers secure and adhere to server-hardening guidelines for all pertinent operating systems and applications, to protect critical systems and environments against ransomware attacks.
  • Participants will understand the two major movements in how ransomware attacks will be waged in the coming year, based on observations in the cybercriminal underground, and realize why following the principle of least privilege and limiting administrative access as much as possible is beneficial to preventing these attacks.              
  • Participants will determine how to train employees and test systems to make sure your security assumptions are verified when tested.

Type: All Access Education


Create or Log in to My Show Planner to add notes.