Policy Best Practices to Thwart Ransomware Attacks

Logo
Presented by

Brad Moldenhauer Field CISO, Zscaler

About this talk

Having the right tools to prevent ransomware means nothing if you don't have the right policies enacted on those tools. Many organizations have decades-old rulesets in place that expand their attack surface unnecessarily, giving attackers freedom of movement in, out, and through their networks. Join Zscaler Field CISO Brad Moldenhauer as he discusses common areas of risk and how to improve your policies to defend against ransomware attacks and improve your zero trust posture. Discover : The modern ransomware attack lifecycle and critical capabilities to disrupt it Common policy fails in high-risk web and application categories Policy best practices to minimize risk without disrupting the business

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (7)
Subscribers (392)
Back in the day when your users were all on the network and your applications resided in your physical data centre, it made sense to establish a secure perimeter around your network. But those days are over, the perimeter is gone, and network security is all but irrelevant. Instead, you need to put your defenses and controls where the connections occur— the internet — so that every connection is fast and secure, no matter how or where users connect or where their applications reside. Embrace Zero Trust to make the cloud a safe place and as an effective approach in today’s cloud-first world. By moving applications and infrastructure to the cloud and untethering employees from their desks, you can realise tremendous advantages in productivity, agility, and cost containment. With our 100% cloud-built secure platform, Zscaler can help you make the move to the cloud, securely.