Ransomware Happens. We Stop It From Spreading: Assess Your Vulnerabilities

Presented by

Nathanael Iversen, Chief Evangelist

About this talk

In part two of our three-part series, “Ransomware Happens. We Stop It From Spreading,” we discuss one often overlooked catalyst for network breaches: technical debt. Unwanted and outdated services that are still active are notorious for inviting in threat actors. But you can limit your breach exposure and improve your digital defenses by pinpointing the applications and systems most at risk. And Illumio can help. Join us for this new webinar to learn how. During this in-depth discussion, you’ll discover how to: ● Block risky ports and non-compliant data flows commonly abused by ransomware and other cyberattacks ● Focus on the most vulnerable applications and workloads ● Restrict applications exhibiting excessive communications or interacting with the internet or command and control servers

Related topics:

More from this channel

Upcoming talks (3)
On-demand talks (81)
Subscribers (4812)
Illumio, the pioneer and market leader of Zero Trust Segmentation, stops breaches from becoming cyber disasters. Illumio Core and Illumio Edge automate policy enforcement to stop cyberattacks and ransomware from spreading across applications, containers, clouds, data centers, and endpoints. By combining intelligent visibility to detect threats with security enforcement achieved in minutes, Illumio enables the world’s leading organizations to strengthen their cyber resiliency and reduce risk.