Hi [[ session.user.profile.firstName ]]

Withstanding a Ransomware Attack: A Step-by-Step Guide

Ransomware has spread epidemically in 2016. Analysts, IT pros and corporate staff list it among the top IT security threats. According to a report prepared by the Cyber Threat Alliance (CTA), CryptoWall, version 3.0, alone has already cost its victims $325 million. Malicious software R&D is funded profusely through sources ranging from the proceeds of criminal activity to money raised through crowdfunding services. Under crowdfunding, those who pay the developer receive a copy and can try using it.

Join our new webinar “Withstanding a ransomware attack: A step-by-step guide” and learn:

-What you should do to ensure your data’s availability,
-How to train your colleagues to avoid being caught on the hook of ransomware,
-How to moderate the aftermath of a ransomware attack,
-And more!
Recorded Nov 8 2016 43 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Russel McDermott, Netwrix
Presentation preview: Withstanding a Ransomware Attack: A Step-by-Step Guide

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Withstanding a Ransomware Attack: A Step-by-Step Guide Recorded: Nov 8 2016 43 mins
    Russel McDermott, Netwrix
    Ransomware has spread epidemically in 2016. Analysts, IT pros and corporate staff list it among the top IT security threats. According to a report prepared by the Cyber Threat Alliance (CTA), CryptoWall, version 3.0, alone has already cost its victims $325 million. Malicious software R&D is funded profusely through sources ranging from the proceeds of criminal activity to money raised through crowdfunding services. Under crowdfunding, those who pay the developer receive a copy and can try using it.

    Join our new webinar “Withstanding a ransomware attack: A step-by-step guide” and learn:

    -What you should do to ensure your data’s availability,
    -How to train your colleagues to avoid being caught on the hook of ransomware,
    -How to moderate the aftermath of a ransomware attack,
    -And more!
  • Why visibility is a crucial part of any security strategy Recorded: Sep 7 2016 44 mins
    Peter Smith, Regional Sales Manager - Europe & Russell McDermott, Sales Engineer, Netwrix
    With a recent increase in high-profile security breaches and compliance violations, traditional security mechanisms, such as firewalls, IDS, and antivirus are no longer enough to defend against external attackers, and insider threats. By having increased visibility into internal changes, configurations, access events, and permissions across the IT infrastructure, organizations can far more effectively defend against such attacks.

    So, please join our local auditing and compliance team from Netwrix, Pete Smith (Regional Sales Manager Europe) and Russell McDermott (Pre-Sales Engineer) and see how Netwrix Auditor can unlock the door into possible breaches in your IT environment.

    From our brief session you will learn:

    • How deeply security breaches and data leaks are really effecting organizations
    • How to protect your data from the insider threats
    • How to have “peace of mind”, and achieve complete visibility of your IT infrastructure
  • Best Practices in Preventing Data Breaches with IT Audit Recorded: Jun 15 2016 46 mins
    John Morgan (Sales Representative), Adam Stetson (Sales Engineer)
    According to the Global State of Information Security Survey 2016, in 2015, the number of security incidents grew by 38% compared to 2014’s levels. Today, it is clear that traditional security measures are no longer as effective as they need to be and that even advanced techniques can be bypassed. Companies have realized the need to develop new security strategies that will help them address contemporary cyber-threats.

    Join Netwrix experts John Morgan (Sales Representative) and Adam Stetson (Sales Engineer) to learn how IT auditing helps solidify your security strategy. During the session, we will talk about:

    • Today’s data breaches and security experts’ predictions;
    • How auditing complements cyber-threat defense mechanisms;
    • Proven recommendations for what should be audited and why.

    Stick around for a live Q&A session for answers to your questions!
  • How to Survive an IT Audit… and Thrive Off It! Recorded: Mar 28 2016 68 mins
    Roy Lopez, Netwrix corporation
    Compliance standards and regulations are complex and they tell you everything about multiple requirements, but nothing about how to fulfill them. In these conditions, how does one survive an IT audit?

    In this webinar, you’ll learn about top control processes that should be taken care of as matters of best practice or as core components of any IT compliance. These areas would probably be the most scrutinized by an auditor and will require evidence that supports the establishment and effectiveness of enabled policies and procedures.
  • Product Demo: Netwrix Auditor 7.1. Active Directory and Exchange Auditing Recorded: Jan 15 2016 61 mins
    Jeff Melnick, Netwrix Corporation
    Watch the recorded product demo of Netwrix Auditor 7.1 and learn more about auditing Active Directory and Microsoft Exchange. During the session, we will guide you on how Netwrix Auditor enables complete visibility into:
    - Active Directory;
    - Group Policy;
    - Microsoft Exchange Server;
    - And more!

    Learn more about Netwrix Auditor: http://www.netwrix.com/auditor.html
  • Solidify your Security Strategy: Dealing with Advanced Threats Recorded: Oct 13 2015 45 mins
    Jeff Melnick, Netwrix Corporation
    According to Verizon’s “2015 Data Breach Investigation Report,” the cyberattacks are becoming increasingly sophisticated. Cybercriminals have been successful in creating new techniques and deceptive tactics that outpace security efforts. Under these conditions, what would be your approach to dealing with security threats?

    Join us for a live webinar session and discover how auditing can help mitigate the risk of data breaches and solidify your security strategy overall. During the session, we will talk about:
    - The latest data breaches and their ramifications;
    - How auditing complements threat-defense mechanisms;
    - What should be audited and why.
  • Become an Active Directory Auditing Superstar: Getting Started Recorded: Aug 20 2015 66 mins
    Adam Bertram (MVP, DevOps Engineer) & Jeff Melnick (Manager of Sales Engineering at Netwrix)
    Join independent expert Adam Bertram, MVP and DevOps Engineer, and Jeff Melnick, Manager of Sales Engineering at Netwrix, for an educational webinar series, in which they will help you upgrade your skills from Active Directory Auditing Beginner to Active Directory Auditing Superstar!

    Watch the recorded webinar session and learn more about how to start auditing process with Active Directory:

    - Typical Active Directory auditing scenarios;
    - First steps in Active Directory auditing;
    - Configurating Active Directory for an audit;
    - Typical problems;
    - Native auditing.

    Watch the second webinar session "Become an Active Directory Auditing Superstar: Deep Dive into Active Directory Auditing":
    https://www.netwrix.com/become_an_active_directory_auditing_superstar_deep_dive.html
Netwrix
Netwrix Corporation was the first to introduce a visibility and governance platform that supports both on-premises and hybrid cloud IT environments. More than 150,000 IT departments worldwide rely on Netwrix to detect insider threats on premises and in the cloud, pass compliance audits with less expense and increase productivity of IT security and operations teams. Founded in 2006, Netwrix has earned more than 90 industry awards and been named to both the Inc. 5000 and Deloitte Technology Fast 500 lists of the fastest growing companies in the U.S. For more information, visit www.netwrix.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Withstanding a Ransomware Attack: A Step-by-Step Guide
  • Live at: Nov 8 2016 2:00 pm
  • Presented by: Russel McDermott, Netwrix
  • From:
Your email has been sent.
or close