Protecting Your Business from the Ransomware Threat

Presented by

James Carder, CISO of LogRhythm, Ryan Sommers, Manager of Threat Intelligence and Incident Response, LogRhythm Labs

About this talk

The Scenario It's 2:00 p.m. on a Friday afternoon, and you get that fateful call. An employee's laptop was hit by the latest CryptoWall variant. The employee was merely searching for how to solve a computer problem, but within minutes of clicking a link, his files have been encrypted and he must pay a ransom fee to get them back. Unfortunately, his laptop wasn't the only thing affected. The file shares that he was connected to were also encrypted beyond reach. Other calls start coming in. Files in various department shares are "corrupted" and things are grinding to a halt. Another ruined weekend for the SOC and IT--and likely another payday for the bad guys. Defending Your Organization Against Ransomware In this webinar, LogRhythm will look at the business problems surrounding the new and evolved ransomware threat. The webinar will also give you a brief technical overview of how these schemes function and how they can be spotted and responded to early enough in the threat lifecycle to severely limit the potential damage. You'll also be given a framework that you can work through to better protect your organization in the face of this looming menace. Webinar topics include: • The early indicators of ransomware • Automated defenses that you can put in place to thwart the attack • The steps that must be followed (with robotic precision) to make a mole hill out of the potential mountain.

Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (94)
Subscribers (8163)
Notice: LogRhythm APJ channel has moved! Please note that this channel will not be updated with new content from 31 December 2020. We invite you to our new and improved LogRhythm channel, which can be accessed here: At LogRhythm, we strive to provide our users and subscribers with the latest security tips & tricks available on-demand. Check out our latest talk: How to build an effective security program with limited resources: