Shutting down Data Staging and Data Exfiltration Attacks

On-Demand Webcast|0.75 Hour

Data Staging and Data Exfiltration are common activities used in today's ransomware playbooks. Data Staging is a combination of locating the data the attackers want to exfiltrate and then bringing all the parts together into a single repository. Data Exfiltration involves disguising the activities to steal confidential data out of the organization's environment. This webcast will demonstrate what such an attack looks like as it unfolds and what security teams can do to thwart these tactics.

Speakers:

Speaker

Jamie Moles

Senior Technical Marketing Manager

ExtraHop

Jamie has a wealth of experience having worked in the Computer Industry for over 34 years - cutting his teeth in IT-MIS he quickly discovered a talent for handling complex technical issues, building sophisticated infrastructure solutions to meet enterprise business requirements and talking to people at all levels of an organization to share knowledge.

With his passion for security and networking being long standing, having been a leader in the early Antivirus industry with his own scanning software and having built and maintained the Cisco routing and switching infrastructure for Europe’s first Application Service Provider, his career has always been focused on the cutting edge of security and infrastructure solutions which he enjoys mastering and telling anyone who will listen how great these new technologies are.

Jamie lives in Portsmouth, England with his long-suffering wife, two kids and a Cavachon called Lottie, and in his spare time he enjoys retro computer gaming, poker and virtual reality.

Speaker

Bill Brenner

VP, Content

CyberRisk Alliance

Bill Brenner is VP of Content Strategy at CyberRisk Alliance -- an InfoSec content strategist, researcher, director, tech writer, blogger and community builder. He was formerly director of research at IANS, senior writer/content strategist at Sophos, senior tech writer for Akamai Technology's Security Intelligence Research Team (Akamai SIRT), managing editor for CSOonline.com and senior writer for SearchSecurity.com.

Sponsored By:

Sponsors

0%