About This Expert Series
Ransomware attacks are slow, and then fast. Research consistently shows that sophisticated attackers have relatively long dwell times, breaking into systems and accounts and then moving laterally around the network and connected cloud services for weeks or months to gather intel and lay the groundwork for a successful ransomware attack.
Smart IT operators set a lot of tripwires for attackers to stumble across to give themselves ample warning. From alerts of break-in attempts, to notifications of potential lateral movement, to high priority alarms and automated action when ransomware encryption is taking place, tripwires are essential to ransomware defense.
Attend this editorial webinar as an expert guides you on a tour of best practices and considerations in monitoring for ransomware threats. Don't miss this installment in the year-long Expert Series on ransomware from ATM and Ransomware.org.
Host Keith Ward Editorial Director & Moderator, ActualTech Media
Featuring Allan Liska Senior Security Architect and Ransomware Specialist, Guest Speaker
Why You Should Join
- Discover critical types of tripwires in a ransomware defense
- Learn how to most effectively monitor ransomware tripwires
- Find out what to do when an alert suggests a ransomware actor is in your environment
- Pick up on common causes of false positives
- Get your ransomware questions answered by an expert!