Three Ways to Protect Against Ransomware

Logo
Presented by

Ashwin Pal | Director Cybersecurity | Unisys Asia Pacific

About this talk

Phishing and ransomware has been a major issue for globally over the last 18 months in particular. Late 2019 saw a number of ransomware attacks on and this can continued into 2020 and 2021 with the COVID pandemic nationally and globally. The reasons for the success of the attacks vary, but they are particularily debilitating as it strikes at the heart of any organisation affecting its ability to operate. With the above in mind, this presentation will focus on discussing three key steps that need to be taken to bolster defences within organisations against phishing and ransomware. The presentation will define ransomware and then address three key areas to be covered to bolster defences as follows: 1. How to cover the basics. This is important as with focus on the rights controls, a large portion of the attack surface can be reduced 2. Understanding the attacks methods and responding with further controls to address any gaps 3. Getting strategic with your approach so that you can stay up to date with your controls and ensure cyber resilience. The presentation will also provide a timeline of steps to be taken to mitigate ransomware related risks. We will conclude the presentation with a discussion on key takeaways as follows: • Increasing and maintaining your defences is a constant effort • Start with the basics and work your way through to strategy • Manage the change well and stay focused on risk mitigation • The journey can be broken down into three key phases to help you in the process: o Cover the basics o Understand how you are likely to be attacked and bolster your defences o Get strategic – prioritise and address gaps.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198766)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.