Hi [[ session.user.profile.firstName ]]

Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Data Recovery

Sponsored by Code42 - More than 45% of businesses were hit with ransomware attacks in the past year. Cybercriminals are rapidly evolving attack methodologies and issuing increasingly higher demands. With no end in sight, organizations are at significant risk for data loss. At the same time, IT security policies, anti-malware protection and end users that lack the ability to recognize sophisticated scams make ransomware inevitable.

Join this live webcast and learn about the prevalence of ransomware in the enterprise and best practices for safeguarding your data against attackers.

Viewers will learn:
- Why ransomware is a burgeoning business and who is being targeted
- Best practices & recommendations to reduce risk and assure continuous data protection and recovery
- How modern endpoint backup protects your end-user data and enables rapid recovery without paying the ransom
Recorded Oct 26 2016 48 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John Kindervag Vice President, Principal Analyst, Forrester Research & Arek Sokol Systems Engineer, Code42
Presentation preview: Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Data Recovery

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Accounting for the Endpoint in Your GDPR Strategy Recorded: Feb 15 2018 45 mins
    Josh Evans, product manager, Code42; Abhik Mitra, product marketing manager, Code42
    The EU General Data Protection Regulation (GDPR) deadline of May 2018 is fast approaching! In the midst of preparing for the new regulation, it is equally important to understand how to provide visibility into endpoint data generated by your knowledge workers, and how to protect it.

    In this live webinar, Code42’s Josh Evans, product manager, and Abhik Mitra, product marketing manager, will discuss how Code42 addresses the endpoint gap and enables your GDPR strategy.
  • How to Detect Risks and Respond in Real-Time Recorded: Feb 13 2018 25 mins
    Charles Weatherhead, principal systems engineer
    Today, companies struggle to detect data exfiltration or theft because they aren’t equipped with the necessary tools to collect, analyze and detect risky file movements. It’s an issue that currently costs the average company $4.3 million a year and unfortunately, this is a growing trend that promises to only get worse.

    In this webinar, Charles Weatherhead, principal systems engineer, will discuss and show Code42’s Security Center, a solution that turns endpoint data into real-time security insights. You will learn how to:

    -Proactively monitor situations of data exfiltration
    -Immediately respond to suspicious data anomalies
    -Block a suspicious insider from accessing a laptop and/or the network
  • How to Protect Your Data Without Holding Users Back Recorded: Feb 2 2018 30 mins
    Michelle Killian, Code42, staff information security analyst; Adam Anderson, 3D Results, Director of IT and Security
    Your mobile employees have valuable ideas and client data on their machines. In fact, as much as 70% of employee-created company data lives on laptops. But in the event of the inevitable cyberattack, traditional ring-fenced security models are unable to protect this data effectively or recover it quickly without slowing down or otherwise burdening your employees.

    In our webinar, hear how Adam Andersen, Director of IT and Security at 3D Results, found a way to protect his company’s IP without compromising end-user freedom. You’ll learn how to:

    Detect legitimate threats
    Help users bounce back from any data loss issue fast, no matter where they work
    Focus on detection and response, because successful attacks and data loss can’t be prevented every time
  • Inside Threat: The Evolution of Attack Patterns Recorded: Sep 20 2017 42 mins
    Rick Orloff, chief security officer, Code42; Fernando Montenegro, senior analyst, 451 Research
    Insider threat refers to an employee or contractor who misuses his/her authorized network access to carry out nefarious activity. Today, sophisticated hackers are compromising user credentials and moving silently within an organization’s digital infrastructure under the guise of an employee profile—an inside threat. Security teams must prepare to recover from both.

    Join Fernando Montenegro, 451 Research senior analyst, and Rick Orloff, chief security officer at Code42 as they:

    - Discuss the burgeoning concept of inside threat
    - Explain how to identify the “malicious actors” without wrongfully implicating employees
    - Share the proactive steps you can take to quickly recover from any data breach incident
  • How Tableau pairs Jamf with Code42 to provide a better device choice experience Recorded: Mar 23 2017 37 mins
    Matt Peterson, Tableau - Aimee Simpson, Code42 - Tad Johnson, Jamf
    Today, end users and IT alike understand the role technology plays in powering productivity. Employee success hinges on having the right tools and technology to work smarter and faster. As a result, businesses have found themselves with a mixture of device types and operating systems in their organization. So how can you adapt to efficiently support and enable employees through device choice?

    In this webinar, we’ll explore how Tableau Software succeeds in a cloud-first, mixed device environment that allows employees to choose their preferred operating system.

    Watch this 30-minute webinar to learn:

    *The benefits and challenges associated with Tableau’s mixed device environment
    *How Tableau performs data migrations for users who are switching platforms
    *Recommendations and considerations for offering Macs to your users


    Speakers:

    Matt Peterson,Technical Support Specialist,Tableau
    Aimee Simpson, Product Marketing Manager, Code42
    Tad Johnson, Solutions Architect, Jamf
  • 3 Proven Workflows for A Successful Windows 10 Migration Recorded: Mar 22 2017 28 mins
    Aimee Simpson, Product Marketing Manager, Code42
    Watch this webinar to explore three distinct migration approaches taken by real businesses. We'll help you identify the best approach for your business, users and timeline. During the session we will cover:

    *The facts on enterprise adoption of Windows 10
    *Planning considerations for your Windows 10 migration project
    *Three distinct approaches to performing device replacements—and the pros and cons associated with each

    About the speaker:

    Aimee Simpson, Product Marketing Manager – Code42
    Aimee is a product marketing manager at Code42 where she helps internal audiences understand what’s happening in the category and influences product decisions through customer and market research. She has always worked in the technology industry, launching her career at data storage company Compellent Technologies at the age of 19. In her free time, she enjoys traveling with her Aussie husband in an attempt to balance her TV addiction.
  • Building a Blueprint for an Insider Threat Program Recorded: Mar 16 2017 58 mins
    Jadee Hanson, Dir of Security, Code 42; Joji Montelibano, Rockwell; Chris Walcutt, Black & Veatch; Brandon Dunlap (Moderator)
    While infosecurity teams are playing defense against external threats, they cannot lose sight of the threat that insiders at their organization pose. Employees, contractors and business associates can all have accounts which provide them legitimate access to systems within the enterprise, but that access can carry significant risk. Detecting, monitoring and preventing such unauthorized access and exflitration is critical. Building an Insider threat program to manage such functions can help an organization get visibility into the problem and streamline these efforts. But where does an organization start when building such a program? What underpinnings need to be in place in order to have success with a program? Get an inside scoop on what it is really like to build and run these types of programs; what are insiders really doing and what are they stealing. Join Code42 and (ISC)2 on March 16, 2017 at 1:00PM Eastern for a discussion on how to construct an effective insider threat program.
  • Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Data Recovery Recorded: Oct 26 2016 48 mins
    John Kindervag Vice President, Principal Analyst, Forrester Research & Arek Sokol Systems Engineer, Code42
    Sponsored by Code42 - More than 45% of businesses were hit with ransomware attacks in the past year. Cybercriminals are rapidly evolving attack methodologies and issuing increasingly higher demands. With no end in sight, organizations are at significant risk for data loss. At the same time, IT security policies, anti-malware protection and end users that lack the ability to recognize sophisticated scams make ransomware inevitable.

    Join this live webcast and learn about the prevalence of ransomware in the enterprise and best practices for safeguarding your data against attackers.

    Viewers will learn:
    - Why ransomware is a burgeoning business and who is being targeted
    - Best practices & recommendations to reduce risk and assure continuous data protection and recovery
    - How modern endpoint backup protects your end-user data and enables rapid recovery without paying the ransom
  • Cybersecurity in 2016: Results from the Cyberthreat Defense Report Recorded: Apr 20 2016 47 mins
    Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42
    The CyberEdge 2016 Cyberthreat Defense Report (CDR) provides a penetrating look at how IT security professionals perceive cyberthreats and plan to defend against them. Based on a November 2015 survey of 1,000 IT security decision makers and practitioners, the CDR delivers insight IT security teams can use to compare their perceptions, priorities and security postures to that of their peers.

    Join Steve Piper, CEO at CyberEdge and Lane Roush, Systems Engineer at Code42 to review the results from the 2016 Cyberthreat Defense Report and:

    •Understand why 62 percent of organizations expect to be breached this year.
    •Learn which cyber threats are of the utmost concern to the enterprise in 2016.
    •Explore how Code42 CrashPlan endpoint backup helps safeguard your most important asset–data!
  • Defend Your Data from the Dark Side Recorded: Mar 23 2016 22 mins
    David Payne, VP Global Systems Engineering at Code42
    Join Code42 for an on-demand webinar to learn how protecting endpoint data can give IT the ability to overcome nearly every situation the "dark side" can conjure. Specifically you'll hear how Code42 can help you:

    • Protect every version of every file forever, with no limits on file size, type or number of files

    • Shorten time to recovery and restore files to any device or iOS at any time

    • Rapidly mitigate incidents by quickly identifying the data on compromised devices
  • Minimizing Data Threats: How to Protect Your Most Precious Resource Recorded: Mar 15 2016 25 mins
    David Lingenfelter, CSA Mobile Working Group Co-Chair
    According to Netskope, the average organization has 730 cloud apps in use, and 90.8% aren't enterprise-ready.* This puts the corporate data you're charged with securing at risk. And as workers continue to use consumer-grade cloud apps to share, access and create corporate data, it's clear that these threats aren't going away. So how can enterprise IT proactively mitigate these risks and protect the integrity of its most precious resource?

    Watch this on-demand webinar, featuring Co-Chair of the Cloud Security Alliance (CSA)'s Mobile Working Group David Lingenfelter, to learn:

    •Key considerations for minimizing the inherent risks embedded within mobile computing
    •Critical vulnerabilities associated with the introduction of IoT in the enterprise, and best practices for mitigation
    •How the CSA's Cloud Controls Matrix (CCM) provides enterprise IT with a framework for global, implementation-ready controls to prevent and manage cloud-centric information-security risks
Code42 is the idea security company
We believe every single idea has value and we secure every version of every file ever created. We give you what other security software can’t – total data visibility & recovery wherever that data lives and moves, so IT & Security teams can tackle the most time consuming stuff a lot faster.

For more information, visit code42.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Take the “Ransom” Out of Ransomware: Harden Defenses and Assure Data Recovery
  • Live at: Oct 26 2016 8:00 pm
  • Presented by: John Kindervag Vice President, Principal Analyst, Forrester Research & Arek Sokol Systems Engineer, Code42
  • From:
Your email has been sent.
or close