Date: Tuesday, September 20, 2022
Time: 12:00 PM Eastern Daylight Time
Duration: 1 hour
Ransomware is at the top of most organizations’ risk profiles. It is an easy vector for attackers to leverage with high returns ensuring it will remain an issue that security teams need to stay ahead of.
Much of the tradecraft used by adversaries is designed for stealth - get in and out without leaving a trace. Ransomware may stand out because it is, in some ways, the exact opposite. Ransomware is designed to be 100% visible to the victim in the form of a ransom note and an inaccessible machine. However, this is only true about the attack payload.
The key to stopping ransomware isn’t focusing on the end of the attack, it’s catching the “pre-ransomware” activity that leads up to that point. If you can detect the threats that deliver the ransomware, you can stop the ransomware before it can cause damage. Knowing where and what to look for could mean the difference between a painful response and another day at the office.
Join this informative discussion to learn:
- Key ransomware trends from the Red Canary Threat Intelligence Report
- Where to look to detect pre-ransomware activity
- Guidance on how to identify the steps that commonly precede a ransomware outbreak
- How a managed detection and response (MDR) provider can supplement our current ransomware defense strategy
Brought to you by:
If you have already registered, click here to access.
Product Marketing Manager, [email protected]
Kelly is a product marketer with an eye for storytelling. Besides her innate passion for writing, she loves finding creative ways to share information through stories, helping make topics like cybersecurity relatable to a broader audience.