Training

Endpoint Security

OnDemand | Key Steps of a Ransomware Incident Response Plan

OnDemand | Key Steps of a Ransomware Incident Response Plan

Businesses are often ill-prepared to deal with ransomware incidents. Especially if an attacker has masqueraded as a privileged user—you may not know they’re doing any damage until it’s too late.

Every organization needs a well-defined, battle-tested incident response plan to combat ransomware. In this webinar, ethical hacker and Chief Security Scientist, Joseph Carson, will help you build one.

Join Joe as he explains how a ransomware attack progresses, and demonstrates ways to prevent, detect, and respond quickly and effectively. He’ll walk through tools and techniques helpful at every stage of a ransomware attack, from initial credential compromise to escalated privileges, exfiltrated data, and ultimately ransomware deployment and ransom demand.

Watch a step-by-step example of how to:

  • Reduce “dwell time” by spotting a ransomware attack early
  • Gather evidence to craft a contextual response that remediates the attack
  • Better secure your environment against future attacks

Webinar Registration

This webinar is available OnDemand.

View Now


Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.