Research Reveals Best Practices in Ransomware Response & Negotiation

Event Time

Originally Aired - Monday, September 12 10:00 AM - 11:00 AM Eastern Time (US & Canada)

Info Alert

Create or Log in to My Show Planner to see Videos and Resources.

Videos

Resources


{{video.title}}

Log in to your planner to join the zoom meeting!

{{chatHeaderContent}}

{{chatBodyContent}}

Resources

Info Alert

You do not have access to this session's resources.

Info Alert

This Session Has Not Started Yet

Be sure to come back after the session starts to have access to session resources.

Event Location

Location: B316


Event Information

Title: Research Reveals Best Practices in Ransomware Response & Negotiation

Description:

New research that analyzes ransomware victims' support chats will give you a behind-the-scenes peak at what is really happening during these negotiations. This session will identify the trends and commonalities across several actors and affiliates and offer guidance for organizations based on what we uncovered after analyzing victim support chats for five ransomware families. We will share six steps you can take to help your organization avoid becoming a victim of a ransomware attack and offer advice on what you should do if you do become one. Understanding what exactly victims go through during the aftermath and recovery process of a ransomware attack can help anyone who finds themselves in a similar situation.            

  • Participants will discover how to employ best practices for keeping servers secure and adhere to server-hardening guidelines for all pertinent operating systems and applications, to protect critical systems and environments against ransomware attacks.
  • Participants will understand the two major movements in how ransomware attacks will be waged in the coming year, based on observations in the cybercriminal underground, and realize why following the principle of least privilege and limiting administrative access as much as possible is beneficial to preventing these attacks.              
  • Participants will determine how to train employees and test systems to make sure your security assumptions are verified when tested.

Type: All Access Education


Notes

Create or Log in to My Show Planner to add notes.


Speakers


Tracks


Sponsors