Error loading player: No playable sources found

1778605

Ransomware

Date
October 19, 2021
Credits
1 CPE | Expired December 31, 2021
Explore related products in the following collection:

Experience the cybercrime victim navigation process, or journey to recovery. Explore symptoms, experiences, pressure and challenges experienced during the crisis and learn industry techniques, best-practices and processes you can take to protect your business.

Learning Objectives

  • Comprehend/understand the journey to recovery from a ransomware attack.
  • Understand/comprehend the lessons learned from impact to recovery after a cybercrime is committed.
  • Apply best practices, tools and techniques to mitigate the threat vector[s].

Speaker

Speaker Image for Martin Okumu
Martin R. Okumu, MSc., CISSP, PMP, TOGAF, ITIL
Chief Information Officer, City and County of San Francisco

Experience Level

Related Products

Thumbnail for What to Expect When You’re Expecting Ransomware - Sponsored by Cisco
What to Expect When You’re Expecting Ransomware - Sponsored by Cisco
We all want a perfect environment to operate securely. In a perfect world, we would have all the resources we need to successfully defend our networks. Reality though paints a much more complex picture. We beg the desktop support team to deploy our endpoint security agents…
Thumbnail for Should You Trust That Email? Technologies and Strategies That Can Help!
Should You Trust That Email? Technologies and Strategies That Can Help!
Email protocols (such as SMTP, POP, IMAP, MIME) were designed to deliver messaging functionality rather than security. It is relatively simple to spoof a sender and/or their domain using email. Yet, the bulk of business communication remains driven through email…
Thumbnail for Translating Compliance - The importance of Effectively Bridging Technology and Audit Speak
Translating Compliance - The importance of Effectively Bridging Technology and Audit Speak
Compliance means conforming to rules, such as specifications, policies, regulations or standards and laws…
Thumbnail for Ransom-wave Aware
Ransom-wave Aware
Ransomware is a combination of social engineering, deception, technology, encryption algorithms, stealth, data analytics, business analysis, high-pressure negotiation, and a highly unusual manifestation of customer service. Defending against ransom and ransomware is still a moving target…