About | Speakers | Exhibitors | Reviews | Photos |
The victim is in a race against time to contain the threat and prevent data loss/encryption while planning for a worst-case ransom payment. In this .. Read more webinar, we will walk you through many of the best practices we have learned while responding [ ]. In this webinar, we will walk you through many of the best practices we have learned while responding to some of the most consequential ransomware breaches. The session will use a recent breach response as a case study where we were successfully able to help the customer not only contain the threat but prevent any data from being encrypted. We will share anonymized findings as well as containment techniques used to prevent the malware from spreading in a highly distributed environment. This case study will also provide useful insights on a staged remediation strategy that balances business needs with risk mitigation. Finally, we will also discuss the recent Department of Treasury Office of Foreign Assets Control (OFAC) guidelines and the legal risks to consider when evaluating potential ransom payments.
- Share your Experience
- Organizer