The recent surge of ransomware attacks has highlighted a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged, targeted approach. This shift in methodology presents threat groups with the opportunity to encrypt more critical data, but also presents security teams with the opportunity to detect activity before data is encrypted. In this talk we’ll explore how this allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption.
This segment is sponsored by Gigamon.Full Episode Show Notes
|[caption id="attachment_210" align="alignleft" width="120"] Adrian Sanabria - Senior Research Engineer[/caption]||[caption id="attachment_210" align="alignleft" width="120"] Matt Alderman - CEO[/caption]||[caption id="attachment_210" align="alignleft" width="120"] Paul Asadoorian - Founder & CTO[/caption]|
|[caption id="attachment_210" align="alignleft" width="120"] Steve Porcello - Senior Security Engineer [/caption]|
Join Amit Bareket, Co-founder & CEO of Perimeter 81 & Paul Asadoorian for a technical deep-dive into the problems inherent in legacy VPN technology. Together they will explore solutions for the modern workforce & how momentum toward perimeter-less architecture is helping redefine the future of cybersecurity. Register Now by visiting https://securityweekly.com/perimeter81