Encrypting files is where ransomware attacks end, not begin. Understanding the attack lifecycle can save your critical files from destruction.
Join this interactive Q&A session with Jacob Sendowski, Ph.D., to learn more about:
• How to use attacker behavior models to detect the precursors of ransomware, including lateral movement, reconnaissance behavior and command and control communications
• How detecting these precursors enables enterprise security teams to contain and remediate infected machines before ransomware attacks propagate throughout their organization and cause damage
About the Presenter
Jacob Sendowski is a Senior Product Manager at Vectra Networks where he is responsible for detections and algorithms as well as hardware platforms. Jacob was previously at Intel, where he held roles in both Intel Capital and Intel Labs. He has a Ph.D. in Electrical Engineering from Caltech.