[1 CPE] Zero Trust: From Theory to Reality in Five Steps

  Presented by Guardicore

Let’s be real. True to its name, there is zero trust about the term “zero trust.” It’s been used as marketecture since its inception. Cut through the fog with this presentation with practical insight and steps to take to ensure your organization makes the most out of ZTA.

[1 CPE] Lessons to Share: An Expert’s Guide to Ransomware Remediation

  Presented by Brian Miller • Co-Founder and CEO, FusionTek

If ransomware makes it past your front line of defense, what’s your next move?

Many businesses get caught in situations where they believe the classic line “this will never happen to me.” That may be true until it does happen to them. From there, a series of unfortunate events will unroll, leaving the business vulnerable to large ransoms which they may or may not be able to pay. Don’t be this business.

This past year, our incident response team has worked on several ransomware remediation projects, and through this effort learned more about how ransomware is deployed. During this presentation, we are going to walk you through how ransomware has changed over time, help you understand what a hacker looks for nowadays, and actionable protection steps to take.

In this presentation you will learn about:

  • The evolution of ransomware
  • Common characteristics of infection
  • A hacker’s typical timetable
  • Recommended actions for remediation

Brian Miller is the co-founder and CEO of FusionTek. He has over 20 years of IT service experience and co-founded FusionTek in 2007. He is focused on delivering advanced cybersecurity and productivity solutions to FusionTek’s clients.

[1 CPE] The Anatomy of a Ransomware Attack

  Presented by Red Canary

In this presentation, we walk through the Anatomy of a Ransomware Attack. Bobby Mazzotti will lead the discussion on best practices and strategies you can apply at your organization. In this webinar, security leaders will learn:

  • How to enhance your team’s abilities to identify security incidents
  • The key components of a ransomware attack
  • Effective ways to improve your security program

[1 CPE] How to Stay Ahead of the Curve in the Ransomware Crisis

  Presented by Blumira

Unfortunately, ransomware is here to stay. Ransomware attacks are becoming more profitable, and ransomware-as-a-service operations continue to lower the barriers of entry for more cybercriminals to launch attacks.

Major attacks like Colonial Pipeline have put ransomware in the spotlight, but it’s not enough to simply be aware of ransomware. Security and IT professionals need to take action and be ahead of the curve to prevent ransomware.

Matt Warner, CTO and co-founder of Blumira, a threat detection and response provider, will discuss what security teams should arm themselves with to win the battle against ransomware. He’ll cover:

  • An overview of the current ransomware threat landscape
  • Security tools and methods to have in your arsenal to detect signs of ransomware
  • Suspicious activity to look for in each step of the ransomware kill chain
  • How leaning into IT security fundamentals can prevent ransomware outbreaks

Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection, and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.

[1 CPE] Immutable Storage: Level-Up Ransomware Readiness

  Presented by Arcserve & StorageCraft

IDC advises that a 3-2-1-1 strategy is the new best practice for effectively protecting customers against ransomware. The last 1 is the important piece of the puzzle, where a copy is also stored on immutable storage. The growing risk of compromise to your customers’ data – specifically via ransomware DEMANDS the most up to date and complete solutions arsenal.

[1 CPE] Metrics That Matter: Confidence and Resilience in Your Security Program

  Presented by ReliaQuest

CISOs say that what they need most in their security program is the confidence that people, processes, and technology are working and effective, and that controls are in place to ensure resiliency in the case of a major event. “Risk” is the vocabulary of the business, yet measuring and discussing this all-important concept in an actionable way remains a unique challenge. In this session, we will discuss:

  • Actionable risk metrics, both for use inside the security function and with outside stakeholders
  • How the language and awareness of information security risk has evolved
  • How the right metrics will benefit the business and win investment for security

[1 CPE] Real-Time Defender Velocity: Code on Code Warfare

  Presented by SentinelOne

Organizations spend more money on cyber security tools every year, yet the number of breaches and the cost of these breaches continues to increase. A new approach is needed that relies on autonomous analysis that can respond at machine speed. By embracing automation, AI, and big data analytics, organizations can better prevent threats, find, and detect what is missed, provide contextual linking for forensic and threat hunting ¬– and even more importantly – self-heal and fully recover when necessary.

[1 CPE] Digital Pandemic: Risk Management & Ransomware

  Presented by INTERFACE Advisory Council

In the summer of 2020, as the world isolated from a pandemic, threat actors began targeting schools, hospitals, and critical public agencies with ransomware. In April of 2020, as the world transitioned overnight to telework, our agency became one of their early targets. In this case study, audiences will trace the attack and response, gain an understanding of the impact of a ransomware attack, learn about the recovery process, and explore commonalities that will allow them to apply our “lessons learned” to their own operations.

Speakers:
Clairmonte Cappelle • Executive Director, Puget Sound Educational Service District
Diana Brown • Director of Agency Technology, Puget Sound Educational Service District

[1 CPE] Ransomware In Focus: How AI Surgically Contains the Threat

  Presented by Darktrace

In the immediate aftermath of a ransomware attack, executives too often face a difficult dilemma: either pay a ransom or shut down critical systems and services. In today’s increasingly complex digital ecosystems, the collateral damage that ensues from ransomware attacks can be broad-ranging and destructive, with organizations taking days, weeks, or even months to recover.

But what if there was another way out – a way to surgically contain ransomware in its earliest stages, without disrupting normal business operations? Join this presentation to learn how Cyber AI is helping thousands of organizations fight back against ransomware. We’ll discuss:

  • The impact of ‘double-extortion’ ransomware and ‘ransomware-as-a-service’
  • Real-world examples of ransomware detected by Cyber AI
  • How self-learning AI responds proportionately to ransomware, thanks to its deep understanding of an organization’s pattern of life

[1 CPE] Ransomware Resilience: Best Practices to Prepare, Mitigate, and Recover

  Presented by Zerto

Large organizations are still being forced to pay ransoms due to ransomware attacks. Disruptions to services and supply chains are putting ransomware victims in the news under a negative spotlight. Join recovery and resilience experts from Zerto to discuss best practices to minimize downtime and avoid paying ransoms by being prepared. In this session, you’ll learn:

  • Ransomware 101: A breakdown of a ransomware attack and how it affects systems
  • What steps you can take to reduce the likelihood of attacks on your system
  • How to best choose a recovery solution for ransomware
  • How you can best harden your recovery systems against attacks
  • How to create a recovery plan to react and recovery quickly
  • How a company hit twice by ransomware improved recovery time from weeks to minutes by planning ahead