Ransomware Protection: Across the Attack Surface and Along the Kill Chain

Logo
Presented by

David Finger, VP, Product & Solutions, Fortinet and Aamir Lakhani, Senior Offensive Attack Researcher, Fortinet

About this talk

For ransomware operators to successfully encrypt data they first need to deliver code to target devices. In order to find those devices, attackers rely on internal and external reconnaissance to map an organization to identify and exfiltrate the data they’re after. If organizations had the ability to stop encryption software, or ransomware code, from entering and installing on their endpoints and successfully encrypting data, ransomware operators can be thwarted. Join this session to learn how you can integrate artificial intelligence across your digital attack surface to detect ransomware, even brand new variants, and prevent it from encrypting your sensitive data. We’ll also do a live demo to show real examples of ransomware/ransomware detection in action.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (18)
Subscribers (1634)
To keep up with the volume, sophistication, and speed of today’s cyber threats, you need AI-driven security operations that can function at machine speed. Our Security Operations portfolio provides advanced threat detection and response capabilities, centralized security monitoring, and automation across the entire Fortinet Security Fabric.