Presented by BlackBerry Cylance
You come into work to a bunch of servers that have been infected with ransomware. Where to go from here? We’ll take you through the basic steps you need to take in the event this happens to you.
Presented by BlackBerry Cylance
You come into work to a bunch of servers that have been infected with ransomware. Where to go from here? We’ll take you through the basic steps you need to take in the event this happens to you.
Presented by Critical Insight
One of the most common questions from IT Leaders and Executives is: Who would attack our organization and why?
In this discussion, we’ll examine the most common cyberattack perpetrators and their methods. From hostile Nation-States to teenagers to some threat actors you might not expect. We will discuss the methods these attackers are using to gain access to your networks, be it unpatched systems, newly found zero days, as well as other avenues into your network. Also covered will be the intent of these attacks, whether it is to steal your intellectual property, extort your cryptocurrency, or to disrupt your operation to meet strategic goals. Most importantly, we will discuss how to tell the difference, and how to protect yourself.
Presented by Elastic
There is no magic bullet in security. Yet many best practices adopted by enterprises across the globe have been proven to allow organizations to mitigate risk and mature their security posture. During this session, you will learn about common trends and challenges in cybersecurity and what organizations are doing to keep up and be ready for the future.
Presented by Synack
According to Gartner’s July 2022 analysis of the application security space, over 80% of today’s web traffic is API traffic. As of 2022, API abuses will move from an infrequent to the most-frequent attack vector, resulting in data breaches for enterprise web applications. Hence, it is imperative that security organizations have a firm understanding of APIs and API security testing approaches.
This presentation covers:
Presented by Cohesity
Join this session for a walk-through of a real-world ransomware attack and the necessary steps to recover. We will cover a cyber insurance form to show how it aligns with our “Protect, Detect, Recover” point of view, and we will speak to the specific capabilities associated with each point.
Presented by Tonaquint Data Center
Carl Wilkins, Director of Cloud Operations for Tonaquint Data Centers provides a Top 10 list of things you can do to mitigate the risk of Ransomware affecting you. Topics will include how to protect your data, how to protect your systems and infrastructure, and situations to be aware of that might indicate the presence of Ransomware in your environment.
Presented by Bitdefender
2021 was “the year of ransomware.” But so were 2017, 2018, 2019, and 2020 – and so far, 2022 is not very different. Ransomware is no longer a problem discussed only in the cybersecurity and tech communities – it is now a regular topic in mainstream media headlines and executive board meetings.
So why is ransomware such a menace, and why can we not seem to get rid of it? One of the reasons is that we seem to miss the continued evolution of ransomware. We keep preparing for the last war. Ransomware in 2022 is very different than ransomware in 2017, yet we still treat it the same way.
Roy Correa, Enterprise Field Engineer will help you to learn more about:
Presented by 42Crunch
APIs are the core building block of every enterprise’s digital strategy, yet they are also the number one attack surface for hackers. Traditional security and management approaches are failing every day as the scale and reach of API attacks increase. The time is now right for enterprises to consider a new end-to-end continuous approach to protecting their APIs. In this talk, you will learn how Global 2500 enterprises are embracing a positive security model combining shift-left and shield-right methodologies to protect their APIs throughout the API lifecycle.
Presented by Cribl
Digital transformations, cloud migrations, and persistent security threats turned observability from a niche concern to an essential capability in today’s organizations. We’re still in the early days of observability maturity, but early stumbles point to where observability must go in the future. This talk discusses where observability is today and the three critical areas necessary for observability to deliver on its promises throughout the enterprise.
Presented by Zerto
Ransomware attacks continue to rise in volume, severity, and costs to businesses attacked while cyber criminals continue inventing new and unexpected methods to spread malware and encrypt critical data. As attacks continue to specialize, no organization is immune to ransomware. So how do you avoid being forced to pay a ransom, disruptions to services and supply chains, and damage to your brand in the news? Join recovery and data protection experts from Zerto to discuss best practices for when – not if – ransomware strikes. Be prepared to minimize downtime, data loss, and mitigate the risks of ransomware. In this session, you’ll learn: