Ransomware: Critical response tactics to overcome the threat | SC Media
Virtual Conference

Ransomware: Critical response tactics to overcome the threat

When

Starts: April 13th, 2021 10:45AM ET

Ends: April 14th, 2021 4:00PM ET

Primarily thanks to ransomware, hackers have been on a winning streak in the war for cybersecurity. Early detection matters, of course. But responding once an attack has taken root is just as critical. To help contain attacks and limit their impact, it’s essential to establish a ransomware readiness plan that strikes the right balance of people, process and technology resources. Responsibility assignment, team training, simulation exercises — all have roles to play.

Join SC Media for a two-day eSummit from April 13-14, to learn from industry leaders as they share insights on adopting an effective response strategy. Topics include:

  • Developing a ransomware incident response playbook
  • An update on new ransomware strains found in the wild
  • The role “human firewalls” can play in your defensive toolkit

AGENDA

DAY 1

10:45 AM ET  
Conference opens 

11:00 AM – 11:45 AM ET 
Keynote: How to respond to the latest ransomware threats 
Speaker: John Bambenek, founder of cybersecurity investigations and intelligence firm Bambenek Consulting 

Ransomware groups are becoming more effective, efficient, and ruthless in their attacks against industry. After a year of gorging on victims and ransom payments during the coronavirus pandemic, these groups are flush with cash and eyeing even bigger targets and paydays in the year ahead. In this Fireside Chat, SC Media Senior Reporter Derek B. Johnson will speak with John Bambenek, founder of cybersecurity investigations and intelligence firm Bambenek Consulting, about: 

  • the ransomware threat landscape in 2021; 
  • new tactics and technologies being brought to bear by law enforcement and industry; 
  • and what CISOs need to know to stay ahead. 

11:45 AM – 12:00 PM ET  
Visit exhibit hall  

12:00 PM – 12:30 PM ET 
Webcast: Ransomware in Focus: How AI Stays One Step Ahead of Attackers 
Speaker(s): Justin Fier, Director of Cyber Intelligence & Analytics 

As the world continues to endure ongoing global disruption, cyber-attackers have been constantly updating their tactics in light of emerging trends. According to MIT Technology Review, 121 million ransomware attacks were recorded in the first half of 2020, each one attempting to encrypt private data and extort payment for its release. The automated elements of these attacks, malware that moves faster than security teams can respond, is one of the most damaging hallmarks of these ransomware campaigns. 

Join Justin Fier, Director of Director of Cyber Intelligence & Analytics at Darktrace, as he unpacks the nuances of some of today’s most costly and advanced ransomware and shares how self-learning AI uniquely empowers organizations across industries to fight back. 

12:30 PM – 12:40 PM ET 
Visit exhibit hall 

12:40 PM – 1:10 PM ET 
Webcast: Your Ransomware Hostage Rescue Guide 
Speaker(s): Erich Kron, Security Awareness Advocate, KnowBe4 

Ransomware attacks are on the rise — and they’re estimated to cost global organizations $20 billion by 2021 with government agencies, healthcare providers, and educational institutions in the U.S. impacted by ransomware attacks at a cost of more than $7.5 billion in 2019 alone. As ransomware attacks become more targeted and damaging, your organization faces increased risk that can have your networks down for days or even weeks. 

So, how can your organization avoid getting held hostage? Join us and Erich Kron CISSP, Security Awareness Advocate at KnowBe4 we look at scary features of new ransomware strains, give actionable info that you need to prevent infections, and provide tips on what to do when you are hit with ransomware. 

In this webcast we will cover: 

  • What new scary ransomware strains are in the wild 
  • Am I infected? 
  • I’m infected, now what? 
  • Proven methods of protecting your organization? 
  • How to create a “human firewall”  

1:10 PM – 1:20 PM ET 
Visit exhibit hall  

1:20 PM – 1:50 PM ET 
Webcast: The Realities of Ransomware 
Speaker(s): Greg Iddon, Threat Response Strategist, Sophos 

Ransomware attacker tactics are constantly shifting – sometimes drastically – In this session Greg looks at the evolution of this prolific and damaging type of attack. He’ll share stories from the frontline, looking at how the criminals operate, their techniques and how you can lower your risk of becoming their next victim. 

1:50 PM – 2:00 PM ET 
Visit exhibit hall   

2:00 PM – 2:30 PM ET 
Webcast: Preemptive Protection Against Ransomware Attacks  
Speaker(s): 
Dom Yip, Director of Sales Engineering, Area1
Bryan Allan, Staff Security Researcher, Area1 

Holding data hostage for a price, ransomware continues to be a costly scourge for organizations. While the FBI has cited over $140 million in reported payouts to ransomware operators over the past couple years, the actual cost to businesses is exponentially higher. Over $10 billion in damages have been attributed to the single ransomware strain NotPetya, for example. 

Often launched as a phishing email and ranging from opportunistic spam-like attacks, to self-propagating worms, to recent targeted attacks, each ransomware family presents its own challenges. 

How can organizations counter these attacks when backup and recovery times still result in business downtime, even when ransom demands aren’t paid? What can be done to prevent these attacks from reaching organizations in the first place? 

Topics of discussion include:

  • Ransomware trends and its impact to businesses 
  • Best practices and recommendations for dealing with ransomware attacks 
  • How Area 1 preemptively stops ransomware before they reach end users and how to use the Area 1 platform in ransomware incident response 

2:30 PM – 2:40 PM ET 
Visit in exhibit hall  

2:40 PM – 3:10 PM ET 
Keynote: Jacki Monson, VP, Chief Technology Risk Officer, CISO, and Chief Privacy Officer at Sutter Health 
Moderator: Jill Aitoro, Editor in Chief at SC Media  

DAY 2 

10:45 AM ET 
Conference opens

11:00 AM – 11:45 AM ET 
Keynote: Break the chain: Predicting ransomware attacks before they happen 
Speaker: John Strand, Owner at Black Hills Information Security, Senior SANS Instructor, IANS Faculty 

Hackers are opportunists. It’s no surprise, therefore, that vulnerability exposures beget ransomware attacks. Look no further than the Microsoft Exchange exploit for examples. So, what can organizations do to minimize exposure? And can effective pen testing or other tactics expose potential gaps that ransomware attackers might target in the wake of a breach? John Strand is owner of Black Hills Information Security, a firm specializing in penetration testing, active defense and hunt teaming services. He will participate in an interactive Q&A, moderated by Jill Aitoro, Editor in Chief of SC Media. 

Join this keynote session to learn about: 

  • the risks that emerge after a breach and 
  • what companies can do to ward off attackers.  

11:45 AM – 12:00 PM ET 
Visit exhibit hall 

12:00 PM – 12:30 PM ET 
Webcast: Preparing for the next generation of ransomware attacks 
Speaker(s): JJ Cranford, Product Marketing Manager, Cybereason

Ransomware has continued to prove itself as an extremely lucrative option for cyber adversaries, making it a top concern for most information security teams.  The sophistication of ransomware has increased, while the bar has been simultaneously lowered for bad actors to deploy and operate successful attacks. 

Join this session to hear more about: 

  • The anatomy of a modern ransomware attack from initial foothold to encryption of sensitive data 
  • The connection between the HAFNIUM attack on Microsoft Exchange servers and modern ransomware tactics 
  • How Cybereason technology can fully prevent, detect and remediate sophisticated ransomware operations  

12:30 PM – 12:40 PM ET 
Visit exhibit hall  

12:40 PM – 1:10 PM ET 
Webcast: Ransomware Loitering Presents an Opportunity for Network Detection 
Speaker(s):  Bassam Khan, VP of Product and Technical Marketing, Gigamon 

The recent surge of ransomware attacks has shown a shift in tactics employed by threat actors looking to extort organizations. Their methodology has changed from a quick, opportunistic attack to a prolonged and targeted approach. While this shift presents threat groups with the opportunity to encrypt more critical data, it also presents security teams with the opportunity to detect activity before data is encrypted. In this webinar we explore how ransomware loitering allows security analysts to use network detection and response capabilities to discover malicious activity between initial compromise and encryption. 

1:10 PM – 1:20 PM ET 
Visit exhibit hall 

1:20 PM – 1:50 PM ET 
Webcast: Assessment Design for Ransomware Threats 
Speaker(s): Jose Barajas, Technical Director, NA Sales Engineering AttackIQ 

In this track, we will walk you through the Assessment Design process for ransomware threats. With attackers leveraging ransomware as a way of generating revenue, whether amateur or nation-state, it is more critical today than ever to understand your posture against these threats. You will learn how to move from listing technologies that should prevent ransomware to proving you can mitigate the threat.

1:50 PM – 2:00 PM ET 
Visit exhibit hall 

2:00 PM – 2:30 PM ET
Presentation by VMware

2:30 PM – 2:40 PM ET

By clicking the Create Account button below, you agree to SC Media Terms and Conditions and Privacy Policy.