Skip to content
     

    Ransomware Incident Response Plan: How to Prepare. How to Respond.

    Register now!Thank You!!

    With ransomware on the rise, understanding how a ransomware attack actually operates is key to preparing your organization’s defenses. Putting together and testing an incident response plan is absolutely essential to limiting any potential damage.

    Join ThycoticCentrify’s Chief Security Scientist and Ethical Hacker Joseph Carson as he explains how a ransomware attack progresses from initial credential compromise to escalated privileges, exfiltrated data, and ultimately the ransomware deployment and ransom demand.

    Watch a step-by-step example of how to:

    • Effectively respond when an attack is detected
    • Gather evidence to craft a contextual response that remediates the attack
    • Better secure your environment against future attacks

    Who should attend this webinar? 

    • IT Security
    • CISOs and Executive Leadership
    • IT operations: Systems Administrators, Helpdesk Teams, Infrastructure Management, Workstation Management, etc.
    • Professionals looking to move into these roles

    What will I learn?

    • The importance of “dwell time” used by hackers to exploit your environment
    • Common attack paths taken by attackers to set the ransomware stage
    • Best methods for investigating ransomware post-attack

    Get answers to these important questions: 

    • What happens behind the scenes before a ransomware attack occurs?
    • What are the best ways to organize my response if a ransomware attack is detected?
    • Once an attack is contained, how do I reduce the risks from future attacks?

    MEET THE PRESENTERS