Business Continuity Management / Disaster Recovery , Fraud Management & Cybercrime , Governance & Risk Management

Beat the Clock: How to Achieve Success Against Ransomware

David Finley of Dell Technologies and Andrew Peters of Unisys on the Cyber Recovery Road Map
David Finley, global director of information assurance and cybersecurity, Data Protection Division, Dell Technologies; Andrew Peters, director, global business development, security, Unisys

Worst-case scenario: Ransomware gets through defenses. It's now a game of "Beat the Clock." David Finley of Dell Technologies and Andrew Peters of Unisys detail the cyber recovery road map and how to generate a plan to both respond to and recover from the attack.

See Also: Ransomware Response Essential: Fixing Initial Access Vector

In this video interview with Information Security Media Group, Finley and Peters discuss:

  • The concurrent goals in response and recovery;
  • Factors that often inhibit recovery;
  • Questions security leaders should ask regarding their own abilities to "beat the clock."

Finley is a global director of information assurance and cybersecurity for the Data Protection Division of Dell Technologies. With a global view of information security and a specialty in recovery after a destructive cyberattack, he offers a world view of the current cybersecurity/recovery landscape. Finley has over 30 years of IT experience and has worked in the fields of software development, access controls/penetration, testing/ethical hacking and IT management.

Peters' 25-year background in cybersecurity extends to the U.S. Air Force Information Warfare Center team that created the first commercial intrusion detection technology at WheelGroup, and he helped turn it into a security staple during his tenure at Cisco Systems. He has experience in networking and security technologies in multiple industries and applications.


About the Author

Tom Field

Tom Field

Senior Vice President, Editorial, ISMG

Field is responsible for all of ISMG's 28 global media properties and its team of journalists. He also helped to develop and lead ISMG's award-winning summit series that has brought together security practitioners and industry influencers from around the world, as well as ISMG's series of exclusive executive roundtables.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.