InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How PCCW Global Leverages Threat Hunting to Win Against Malware Infections

Presented by

Frederic Lhoest, Senior Technology Architect, PCCW Global | Geert Verbist, Senior Sales Engineer, Rubrik

About this talk

In the midst of a cyberattack recovery, identifying what systems were first affected by malicious threat actors - and when - can be challenging. In this session, you’ll hear how PCCW Global - a leading communications service provider, offering the latest mobility, voice and data solutions to multinational enterprises, telecommunications partners, cloud and application service providers - leverages threat hunting and monitoring to win against malware infection by analysing backup snapshots and providing insights that help avoid malware reinfection during recovery. Watch this and learn about: -> How PCCW Global uses threat hunting solution to find malware and avoid reinfection -> How to scan backups for indicators of compromise using file patterns, file hashes, or YARA rules -> How to analyse backups to surface clean snapshots and identify the earliest indicator of compromise Make sure to take a look at the attachments as well - we've added extra learnings on how to optimise data protection and provided you with additional resources to help set you up for success.
Rubrik

Rubrik

21695 subscribers142 talks
Zero Trust Data Management Webcasts For IT Professionals
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.
Related topics