InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Ask me Anything about Ransomware

Presented by

Menachem Shafran | Zur Ulianizky | Paul Giorgi | Shay Siksik

About this talk

Ransomware groups are looking for ways to reach your critical assets, to increase their chances of getting a higher ransom payout. For the same reason, they have begun employing the double extortion technique, where before encrypting your data, they exfiltrate it and then threaten to leak it online. Searching for routes to reach your critical assets, attackers are lying low, propagating the network as a result of misconfigurations, unpatched vulnerabilities and mismanaged credentials. You probably have some questions. Join our open-ended Q&A session, where a forum of experts will relieve any doubts and answer all your questions. Here are some examples to get you started: Are there emerging techniques of ransomware that make use of other techniques besides encryption? Do we still call it ransomware if a valuable cloud resource is held for ransom? How should an organization simulate a ransomware attack? From the attacker’s perspective, what is ransomware behind the scenes? What are the differences between the ransomware of 2019 to the ransomware of 2021, and how do you envision the ransomware attacks in 2022 and beyond?
XM Cyber

XM Cyber

3503 subscribers82 talks
Continuous Exposure Management
XM Cyber brings innovation to the security industry with patented products that address the unique gaps that arise in large, complex networks. By safely and continuously simulating attacks, XM Cyber exposes real-life security issues that arise from vulnerabilities, human error and misconfigurations. Remediation recommendations are prioritized based on criticality and relation to the customer’s most critical assets. The customer achieves a continual cycle of security posture improvement, optimizing security investments and human resources, and lowering exposure and risk. XM Cyber was founded by top executives from the Israeli cyber intelligence community and has offices in the US, UK, and Israel. For more information, go to xmcyber.com.
Related topics