Ransomware has become one of the most pervasive and insidious cybersecurity threats. Today, criminals don’t even need much in the way of technical skills to carry out attacks, since multiple ransomware-as-a-service programs are available on the dark web. Moreover, the damage from a ransomware attack can be not just expensive but even catastrophic; some businesses never recover. Therefore, every IT team needs to build a strong protection strategy before it’s too late.
This session will walk you through the phases of a ransomware attack and a real-life example. Then, we’ll detail how to detect an attack in its early stages and tackle it along the kill chain. By the end of the webinar, you’ll understand how to build an actionable strategy that will make your organisation more resilient against ransomware attacks.
Anatomy of an Attack:
Ransomware Theory and Practice
On-Demand Webinar
Introduction to ransomware anatomy
NIST-aligned actionable strategy
Real-life example of an attack flow
Better-together solution mapping for a layered defence strategy
Webinar Presenters
Dirk Schrader
CISSP, CISM, ISO27001 Practitioner
at NNT, Now part of Netwrix
Martin Cannard
VP of Product Strategy
at Netwrix Corporation
Martin is an experienced technologist, with over 30 years in the Privileged Access Management and security space. Prior to Stealthbits, Martin led the privileged access team at BeyondTrust where he took their password management solution from unknown to a recognized leader in the industry within 3 years. At BeyondTrust he also drove the development of their first SaaS PAM product as well as a new micro service-based platform for DevOps security. Prior to BeyondTrust, Martin held key management positions at Quest/Dell, Novell, Fortefi and Symantec. He is a recognized expert and a regular speaker for security events and webinars.
Being a native of Germany, he brings more than 25 years of delivering IT security expertise at a global scale. His work focuses on advancing cyber resilience as a sophisticated, new approach to tackle cyber-attacks faced by governments and organizations of all sizes for the handling of change and vulnerability as the two main issues to address in information security. He has published numerous articles in German and English about the need to address change and vulnerability to achieve cyber resilience, drawing on his experience and certifications as CISSP (ISC²) and CISM (ISACA).
Ransomware has become one of the most pervasive and insidious cybersecurity threats. Today, criminals don’t even need much in the way of technical skills to carry out attacks, since multiple ransomware-as-a-service programs are available on the dark web. Moreover, the damage from a ransomware attack can be not just expensive but even catastrophic; some businesses never recover. Therefore, every IT team needs to build a strong protection strategy before it’s too late.
This session will walk you through the phases of a ransomware attack and a real-life example. Then, we’ll detail how to detect an attack in its early stages and tackle it along the kill chain. By the end of the webinar, you’ll understand how to build an actionable strategy that will make your organisation more resilient against ransomware attacks.
Anatomy of
an Attack:
Ransomware Theory and Practice
On-Demand Webinar
Introduction to ransomware anatomy
NIST-aligned actionable strategy
Real-life example of an attack flow
Better-together solution mapping for a layered defence strategy
During this session, we’ll cover:
Dirk Schrader
CISSP, CISM, ISO27001 Practitioner
at NNT, Now part of Netwrix
Martin Cannard
VP of Product Strategy
at Netwrix Corporation
SPEAKERS
© 2024 Netwrix Corporation
5 New Street Square, London EC4A 3TW | Phone: +44 (0) 203 588 3023
Corporate Headquarters: 6160 Warren Parkway, Suite 100 Frisco, TX, US 75034 | International: 1-949-407-5125