Ransomware in 2022: What You Need to Know and How to Prepare

Presented by

Erik Yunghans, Principal Product Manager at Zscaler and Jason Rivera, Director of Threat Advisory Group Global at Crowdstrike

About this talk

Throughout 2021 we saw high-profile ransomware attacks taking over headlines and capturing public attention. In 2022, we have already seen the new Log4j vulnerability exploited by ransomware gangs and a CISA advisory warning telling businesses to prepare for an increase of ransomware attacks on the US supply chain in 2022 and beyond. When it comes to defending against ransomware attacks, it’s critical that your SecOps team understands up-to-date trends and best practices, including: What puts an organization at higher risk for a ransomware attack? - Are backups the only line of defense? - When is it best to just pay the ransom? - How can we build better immunity to protect against ransomware attacks? Watch our webinar with Zscaler’s Principal Product Manager for Cloud Sandbox and veteran ransomware expert Erik Yunghans, and Emily Laufer, Senior Product Marketing Manager for ThreatLabz at Zscaler, to learn the answers to these questions and gain a better understanding of how implementing zero trust is the only effective strategy for ransomware defense. During this live event, Erik and Emily will showcase the hands-on zero trust strategies using the Zscaler Zero Trust Exchange to build highly effective defense programs against the most advanced ransomware attacks.

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (77)
Subscribers (12628)
Back in the day when your users were all on the network and your applications resided in your physical data center, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant. Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside. By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realize tremendous advantages in productivity, agility, and cost containment. With our 100% cloud built secure platform, Zscaler can help you make the move to the cloud, securely.