Virtual Conference

Ransomware: Critical response tactics to overcome the threat

On-Demand Event Tuesday, April 13, 2021 - 10:45 AM EDT


(Aired on April 13-14, 2021)
Earn up to 6 CPEs

Primarily thanks to ransomware, hackers have been on a winning streak in the war for cybersecurity. Early detection matters, of course. But responding once an attack has taken root is just as critical. To help contain attacks and limit their impact, it’s essential to establish a ransomware readiness plan that strikes the right balance of people, process and technology resources. Responsibility assignment, team training, simulation exercises — all have roles to play.

Learn from industry leaders as they share insights on adopting an effective response strategy. Topics include:

  • Developing a ransomware incident response playbook
  • An update on new ransomware strains found in the wild
  • The role “human firewalls” can play in your defensive toolkit

SESSIONS:

Keynote: How to respond to the latest ransomware threats 
John Bambenek, founder of cybersecurity investigations and intelligence firm Bambenek Consulting 

Ransomware groups are becoming more effective, efficient, and ruthless in their attacks against industry. After a year of gorging on victims and ransom payments during the coronavirus pandemic, these groups are flush with cash and eyeing even bigger targets and paydays in the year ahead. In this Fireside Chat, SC Media Senior Reporter Derek B. Johnson will speak with John Bambenek, founder of cybersecurity investigations and intelligence firm Bambenek Consulting, about: 

  • The lack of viable ransomware protection tools and strategies for small and medium businesses
  • The role big tech companies can play building security into their own products
  • What CISOs need to know to stay ahead

Webcast: Ransomware in Focus: How AI Stays One Step Ahead of Attackers 
Justin Fier, Director of Cyber Intelligence & Analytics 

As the world continues to endure ongoing global disruption, cyber-attackers have been constantly updating their tactics in light of emerging trends. According to MIT Technology Review, 121 million ransomware attacks were recorded in the first half of 2020, each one attempting to encrypt private data and extort payment for its release. The automated elements of these attacks, malware that moves faster than security teams can respond, is one of the most damaging hallmarks of these ransomware campaigns. 

Hear Justin Fier, Director of Director of Cyber Intelligence & Analytics at Darktrace, as he unpacks the nuances of some of today’s most costly and advanced ransomware and shares how self-learning AI uniquely empowers organizations across industries to fight back. 

Webcast: Your Ransomware Hostage Rescue Guide 
Erich Kron, Security Awareness Advocate, KnowBe4 

Ransomware attacks are on the rise — and they’re estimated to cost global organizations $20 billion by 2021 with government agencies, healthcare providers, and educational institutions in the U.S. impacted by ransomware attacks at a cost of more than $7.5 billion in 2019 alone. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks. 

So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware. 

This webcast will cover: 

  • What new scary ransomware strains are in the wild 
  • Am I infected? 
  • I’m infected, now what? 
  • Proven methods of protecting your organization? 
  • How to create a “human firewall”

Webcast: The Realities of Ransomware 
Greg Iddon, Threat Response Strategist, Sophos

Ransomware attacker tactics are constantly shifting – sometimes drastically – In this session Greg looks at the evolution of this prolific and damaging type of attack. He’ll share stories from the frontline, looking at how the criminals operate, their techniques and how you can lower your risk of becoming their next victim. 

Webcast: Preemptive Protection Against Ransomware Attacks  
Dom Yip, Director of Sales Engineering, Area1
Bryan Allan, Staff Security Researcher, Area1 

Holding data hostage for a price, ransomware continues to be a costly scourge for organizations. While the FBI has cited over $140 million in reported payouts to ransomware operators over the past couple years, the actual cost to businesses is exponentially higher. Over $10 billion in damages have been attributed to the single ransomware strain NotPetya, for example. 

Often launched as a phishing email and ranging from opportunistic spam-like attacks, to self-propagating worms, to recent targeted attacks, each ransomware family presents its own challenges. 

How can organizations counter these attacks when backup and recovery times still result in business downtime, even when ransom demands aren’t paid? What can be done to prevent these attacks from reaching organizations in the first place? 

Topics of discussion include:

  • Ransomware trends and its impact to businesses 
  • Best practices and recommendations for dealing with ransomware attacks 
  • How Area 1 preemptively stops ransomware before they reach end users and how to use the Area 1 platform in ransomware incident response 

Keynote: Jacki Monson, VP, Chief Technology Risk Officer, CISO, and Chief Privacy Officer at Sutter Health 
Moderator: Jill Aitoro, Editor in Chief at SC Media  

Keynote: Break the chain: Predicting ransomware attacks before they happen 
Speaker: John Strand, Owner at Black Hills Information Security, Senior SANS Instructor, IANS Faculty 

Hackers are opportunists. It’s no surprise, therefore, that vulnerability exposures beget ransomware attacks. Look no further than the Microsoft Exchange exploit for examples. So, what can organizations do to minimize exposure? And can effective pen testing or other tactics expose potential gaps that ransomware attackers might target in the wake of a breach? John Strand is owner of Black Hills Information Security, a firm specializing in penetration testing, active defense and hunt teaming services. He will participate in an interactive Q&A, moderated by Jill Aitoro, Editor in Chief of SC Media. 

This keynote session will cover: 

  • The risks that emerge after a breach and 
  • What companies can do to ward off attackers 

Webcast: Preparing for the next generation of ransomware attacks 
JJ Cranford, Product Marketing Manager, Cybereason

Ransomware has continued to prove itself as an extremely lucrative option for cyber adversaries, making it a top concern for most information security teams.  The sophistication of ransomware has increased, while the bar has been simultaneously lowered for bad actors to deploy and operate successful attacks. 

Topics covered include: 

  • The anatomy of a modern ransomware attack from initial foothold to encryption of sensitive data 
  • The connection between the HAFNIUM attack on Microsoft Exchange servers and modern ransomware tactics 
  • How Cybereason technology can fully prevent, detect and remediate sophisticated ransomware operations  

Webcast: Ransomware Loitering Presents an Opportunity for Network Detection 
Bassam Khan, VP of Product and Technical Marketing, Gigamon

The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted. In this webinar we explore how ransomware loitering allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption. 

Webcast: Assessment Design for Ransomware Threats 
Ben Opel, Senior Director, Customer Success, AttackIQ 

In this track, we will walk you through the Assessment Design process for ransomware threats. With attackers leveraging ransomware as a way of generating revenue, whether amateur or nation-state, it is more critical today than ever to understand your posture against these threats. You will learn how to move from listing technologies that should prevent ransomware to proving you can mitigate the threat.

Webcast: Modern Bank Heists: Financial Fraud Escalation
Tom Kellermann, Head of Cybersecurity Strategy, VMware
Rick McElroy, Principal Cybersecurity Strategist, VMware
Taree Reardon, Senior Threat Analyst Shift Lead, VMware

The financial industry’s digital transformation efforts are under siege – going well beyond traditional account takeover. Payment card fraud, synthetic IDs, integrity attacks, and more; how can you best secure yourself and your organization? 

With the fourth annual VMware Carbon Black Modern Bank Heists Report, we’ve taken the pulse and perspectives of 126 bank CISOs. Hear from Tom Kellermann, Head of Cybersecurity Strategy for VMware and member of the Cyber Investigations Advisory Board for the US Secret Service, and Rick McElroy, Principal Cybersecurity Strategist for VMware, to gain insights into: 

  • An unvarnished perspective into trends of attacks – notably the evolution of the cyber kill-chains 
  • Ground truth on cybercrime cartels and their escalation of counter-incident response and island hopping 
  • An understanding of a new paradigm for cybersecurity entitled Intrusion Suppression

Sponsors

Area 1AttackIQCybereasonDarkTraceGigamonKnowBe4SophosVMWare
0%