Nov 3, 2021
98 Views
0 0

Minimize Ransomware Damage by Stopping Lateral Movement

Written by

Fraud Management & Cybercrime , Ransomware
Organized ransomware groups like DarkSide and REvil consistently bypass existing defenses at some of the world’s most well-defended organizations. Once they gain entry, they move laterally to encrypt and steal as much sensitive data as possible. If you can stop their ability to move laterally, you dramatically reduce the scope of damage they can cause.
Join us as we deconstruct a real-life ransomware example to reveal the actual attack sequences and show how you can build zero trust-based defenses against lateral movement. We’ll take a deep dive into using deception-based active defenses for detecting and disrupting ransomware attacks. You will learn:
2:00 PM EST
Unlimited Webinars + OnDemand Access
2:00 PM EST
Unlimited Webinars + OnDemand Access
CISO & VP Security Research at Zscaler
VP Active Defense, Zscaler
Was added to your briefcase
Minimize Ransomware Damage by Stopping Lateral Movement
Minimize Ransomware Damage by Stopping Lateral Movement
As Chief Information Security Officer & VP Security Research at Zscaler, Deepen Desai is responsible for running the global security research operations as well as working with the product group to ensure that the Zscaler platform and services are secure. Deepen has been actively involved in the field of cybersecurity for the past 15 years. Prior to joining Zscaler, he held a security leadership role at Dell SonicWALL.
Hidayatullah is a serial cybersecurity entrepreneur and his past ventures have investigated numerous high-profile data breaches with clients spanning critical infrastructure, global financial institutions, and Fortune 500 companies. Hidayatullah’s work has been a cover feature story in Fortune India magazine, and his thoughts on technology risk management appear regularly in the print and television media.
Sign in now
Need help registering?
Contact support
Complete your profile and stay up to date
Contact Support
Create an ISMG account now
Create an ISMG account now
Need help registering?
Contact support
Sign in now
Need help registering?
Contact support
Sign in now
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.

source

Article Categories:
Database Breaches

Comments are closed.