In this discussion-based panel event, Frank Johnson, battle-tested, ransomware survivor Public Sector CIO and Chris Fedde, Board Member of
Votiro, will review lessons learned from Frank's experience dealing with a breach.
Along with stories from inside the breach, this session will also explore how best to...
Ransomware is a prevalent cybersecurity threat. Threat actors are constantly changing tactics looking for new ways to force ransom payments. With each new emerging ransomware threat family, the size and scope of threats are more aggressive too. This has led to incredible increases in the average ransoms paid over the...
This article discusses a case that started with an email from a brand-new MTR customer.
The customer had just heard that a third-party vendor they work with had been hit by ransomware and was worried they might also be affected.
Download this case to get a deeper analysis about how:
The script was a downloader...
Ransomware creators are acutely aware that network or endpoint security controls pose a fatal threat to any operation, so they've developed a fixation on detection logic. Modern ransomware spends an inordinate amount of time attempting to thwart security controls, tilling the field for a future harvest.
Download this...
A panel of IT forensic, legal and insurance experts will speak to the ever-present theme of data exfiltration threats in ransomware scenarios, how to protect against it, how to deal with it when it happens and the ensuing challenges.
Join experienced incident response investigators Shane Shook, PhD - Advisor & Venture Consultant, Forgepoint Capital, and Tim Keeler, Co-founder & CEO at Remediant, as they exchange war stories of stopping ransomware and lateral movement from past investigations.
They will also showcase a live demo of how state...
Back when the world was introduced to WannaCry, a potent strain of ransomware code that infected and paralyzed 230,000 computers across 150 countries.
In what would become a troubling theme, WannaCry, and subsequent strains of ransomware, could have been prevented from becoming a public nuisance had proper...
Many companies have already been hit by a ransomware attack- or will be. Technically astute hackers continue their ability to infiltrate ransomware so much, that Ransomware as a Service is now available on the darknet. In today's hyper connected world, it could be only a matter of time until 'something' happens. How...
Discover the day-to-day reality on the frontlines of cybersecurity with this independent survey of 3,100 IT managers across 12 countries. The report's findings reveal that organizations face an impossible puzzle when it comes to securing against cyber threats.
Read this report to discover:
How many organizations...
The 2019 Internet Security Threat Report takes a deep dive into insights from the Symantec Global Intelligence Network (GIN), revealing the latest trends in cyber security attacks including ransomware, formjacking, cloud security and mobile threats.
Through GIN, Symantec has established the largest civilian threat...
Remote browser isolation eliminates both web-based threats such as drive-by-downloads and email-based attacks like phishing and ransomware. The technology removes the browsing process from the desktop and moves it to the cloud, effectively creating an "air gap" between the Internet and enterprise networks. Gartner...
Most companies have huge gaps in their cyber defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: Assume Breach.
Join Roger A. Grimes, a 30-year computer consultant, for this webinar where he explores the latest research on what's wrong with current defenses and how...
Insecure implementations of Remote Desktop Protocol have exposed organizations to serious risks of cyber attacks. Ransomware like SamSam and cryptominers like CrySis exploit insecure configurations, resulting in large and well-publicized breaches like the one that occurred at LabCorp. Because of the nature of Remote...
A new era of cyber threats has dawned. Ransomware has advanced significantly and is now capable of taking out infrastructure and operations across the globe, weaponizing known vulnerabilities such as EternalBlue and crippling businesses for months or more. WannaCry marked the start of these techniques and was one of...
Almost 6 million Americans had their patient records stolen or exposed in healthcare breaches over the past year with ransomware being a frequent and highly effective form of attack. Recent successful variants such as SamSam and Ryuk have caused an estimated $7 million in damages alone.
Clearly, ransomware is a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.