Research Reveals Best Practices in Ransomware Response & Negotiation
New research that analyzes ransomware victims' support chats will give you a behind-the-scenes peak at what is really happening during these negotiations. This session will identify the trends and commonalities across several actors and affiliates and offer guidance for organizations based on what we uncovered after analyzing victim support chats for five ransomware families. We will share six steps you can take to help your organization avoid becoming a victim of a ransomware attack and offer advice on what you should do if you do become one. Understanding what exactly victims go through during the aftermath and recovery process of a ransomware attack can help anyone who finds themselves in a similar situation.
- Participants will discover how to employ best practices for keeping servers secure and adhere to server-hardening guidelines for all pertinent operating systems and applications, to protect critical systems and environments against ransomware attacks.
- Participants will understand the two major movements in how ransomware attacks will be waged in the coming year, based on observations in the cybercriminal underground, and realize why following the principle of least privilege and limiting administrative access as much as possible is beneficial to preventing these attacks.
- Participants will determine how to train employees and test systems to make sure your security assumptions are verified when tested.
All Access Education