How To Apply Threat Hunting Solutions To Find Malware And Avoid Reinfection

Logo
Presented by

Marc Craddock, Sales Engineer at Rubrik

About this talk

In the midst of a cyberattack recovery, identifying what systems were first affected by malicious threat actors - and when - can be challenging. Modern threat hunting technology and methods can help you analyse backup snapshots and provide you with insights that help avoid malware reinfection during recovery. During this webinar you will learn: -> How modern threat hunting solutions find malware to avoid reinfection -> How to scan backups for indicators of compromise using file patterns, file hashes, or YARA rules -> How to analyse backups to surface clean snapshots and identify the earliest indicator of compromise -> How Rubrik Threat Hunting helps you quickly recover in the event of a cyber attack Make sure to take a look at the attachments as well - we've added extra learnings on how to optimise data protection and provided you with additional resources to help set you up for success.
Related topics:

More from this channel

Upcoming talks (11)
On-demand talks (90)
Subscribers (11384)
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.