The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
Experience the cybercrime victim navigation process, or journey to recovery. Explore symptoms, experiences, pressure and challenges experienced during the crisis and learn industry techniques, best-practices and processes you can take to protect your business.
Learning Objectives
Comprehend/understand the journey to recovery from a ransomware attack.
Understand/comprehend the lessons learned from impact to recovery after a cybercrime is committed.
Apply best practices, tools and techniques to mitigate the threat vector[s].
We all want a perfect environment to operate securely. In a perfect world, we would have all the resources we need to successfully defend our networks. Reality though paints a much more complex picture. We beg the desktop support team to deploy our endpoint security agents…
Email protocols (such as SMTP, POP, IMAP, MIME) were designed to deliver messaging functionality rather than security. It is relatively simple to spoof a sender and/or their domain using email. Yet, the bulk of business communication remains driven through email…
Ransomware is a combination of social engineering, deception, technology, encryption algorithms, stealth, data analytics, business analysis, high-pressure negotiation, and a highly unusual manifestation of customer service. Defending against ransom and ransomware is still a moving target…