Responding to Ransomware: Containing the Threat and Preventing Encryption

Responding to Ransomware: Containing the Threat and Preventing Encryption

1.341 Lượt nghe
Responding to Ransomware: Containing the Threat and Preventing Encryption
Responding to ransomware involves far more than the typical technical challenges of breach response. The victim is in a race against time to contain the threat and prevent data loss/encryption while planning for a worst-case ransom payment. In this webinar, we will walk you through many of the best practices we have learned while responding to some of the most consequential ransomware breaches. The session uses a recent breach response as a case study where we were successfully able to help the customer not only contain the threat but prevent any data from being encrypted. We will share anonymized findings as well as containment techniques used to prevent the malware from spreading in a highly distributed environment. This case study will also provide useful insights on a staged remediation strategy that balances business needs with risk mitigation. Finally, we will also discuss the recent Department of Treasury Office of Foreign Assets Control (OFAC) guidelines and the legal risks to consider when evaluating potential ransom payments. Watch this webinar to understand first-hand from our incident responders how to: Identify the type and scope of the ransomware attack. Contain the spread while remediating the initial infection vector. Consider the pros and cons of paying the ransom. Speaker Jason Bevis, VP Awake Labs