[APAC] Combatting ransomware and APT activity with process-level monitoring

Logo
Presented by

Dan Crossley, Sales Engineering Manager, LogRhythm and Imran Hafeez, LogRhythm Analytic Co-Pilot Consultant

About this talk

Ransomware has evolved from a commodity malware strain primarily targeting home users, to a devastating and effective tool in the arsenal of advanced threat groups. As these human-operated cyberattacks continue to be a lucrative source of income for threat actors, ransomware will continue to pose a major threat to many organisations. Dan Crossley, Sales Engineering Manager, LogRhythm and Imran Hafeez, LogRhythm Analytic Co-Pilot Consultant, discuss: • The anatomy of a human operated ransomware attack • What additional log data can be enabled within a Windows environment to allow better tracing of threat actor activity, including: o Process creation with command-line execution o PowerShell logging o Microsoft Sysmon Save your seat to discover how you can trace and alert on possible threat actor activity within your environment, with these log sources.
Related topics:

More from this channel

Upcoming talks (2)
On-demand talks (257)
Subscribers (76946)
LogRhythm helps security teams stop breaches by turning disconnected data and signals into trustworthy insights. From connecting the dots across diverse log and threat intelligence sources to using sophisticated machine learning that spots suspicious anomalies in network traffic and user behavior, LogRhythm accurately pinpoints cyberthreats and empowers professionals to respond with speed and efficiency. With cloud-native and self-hosted deployment flexibility, out-of-the-box integrations, and advisory services, LogRhythm makes it easy to realize value quickly and adapt to an ever-evolving threat landscape. Together, LogRhythm and our customers confidently monitor, detect, investigate, and respond to cyberattacks. Learn more at logrhythm.com