‘Hosted by’ statement: This webinar series is graciously hosted by ActZero, who is a contributing member of the Blueprint for Ransomware Defense working group. Hosting of this webinar does not constitute an endorsement or promotion of any participants’ solutions.
Now that you’ve inventoried your assets and built a strong foundation for protecting your devices, network and people, it’s time to add the next layer of Safeguards. This 3rd session of our 5-part series focuses on the actionable Safeguards required to block a ransomware attack.
Join Karen Evans (CRI), Brian Cute (GCA), Shehzad Mirza (CyberWA), and Josh Franklin (CIS) as they discuss the set of practices an enterprise must implement in order to effectively manage devices and the people who use them.
In the session you’ll learn:
- Best practices for software management
- Practitioner advice on managing access controls, and the tools to help out
- How identity protection plays such an important role in ransomware defense, and why multifactor authentication is a game changer to your security
- Methods for optimizing vulnerability and patch management processes