The accreditors of this session require that you periodically check in to verify that you are still attentive.
Please click the button below to indicate that you are.
With ransomware on the rise, understanding how a ransomware attack actually operates is key to preparing your organization's defenses. In this session, we'll explain how a ransomware attack progresses from initial credential compromise to escalated privileges, exfiltrated data and ultimately the ransomware deployment and ransom demand. Watch a step-by-step example of how to - Effectively respond when an attack is detected; - Gather evidence to craft a contextual response that remediates the attack; - Better secure your environment against future attacks