Applying Right Defenses in Fighting Ransomware Attacks
Ransomware attacks are becoming all-pervasive across organizations not limited to any region. The security teams need to be conscious of the five stages of its attack pattern—be it initial exploitation, installation, backup destruction, encryption, and extortion. What are some of the tactics attackers use to accomplish the goals, and what are some effective defense techniques security teams need to adopt in fighting ransomware intrusions?
See Also: Code to Cloud Roadshow - Minneapolis In-Person Event hosted by Palo Alto Networks
The session will discuss:
- Elaborating the five-stage ransomware exploitation process
- A proactive response to ransomware attacks
- Applying the right defense techniques in detecting and protecting from such attacks