Recovery from a ransomware attack: How to prepare and plan to minimize risk

Logo
Presented by

Allan Cytryn, Principal | Risk Masters International

About this talk

Ransomware is an omnipresent threat to every business. A comprehensive defense and recovery plan is an essential requirement for managing and mitigating this risk. Such a plan must take a 360-degree view of the enterprise’s risk as well as identify and address the many uncertainties faced by victims of ransomware. This presentation from Risk Masters International's Allan Cytryn will provide this 360-degree view. Participants will come away understanding the ransomware risk vectors, the options for addressing them, and the limits of their effectiveness. Recovery is a key component of risk mitigation. Relevant options and alternatives will be discussed. In addition, attendees will learn the the operational lifecycle of a ransomware attack – from anticipatory risk mitigation, to attack, then to recovery, and finally resumption of normal operations. Recovery planning is only effective if conducted in this broader context. About the speaker: Allan has more than 30 years of experience in senior IT Leadership roles in the finance and financial services sector. His responsibilities have included Regional CIO and Managing Director for Applications at Deloitte, CIO for Simpson Thacher & Bartlett, Vice President of Corporate Finance at Goldman Sachs, Group Vice President for Funds Transfer and Foreign Exchange Systems at Bankers Trust. Allan is also on the Executive Board of the Boston Global Forum, a think-tank founded by Governor Michael Dukakis. In this role he has advised governments on Cyber Security and AI policies and has contributed to the 2016 G7 Cyber Security Declaration at the G7 meeting in Isa Shima, Japan. This was the first ever joint statement on cyber security from the G7 world leaders.
Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (708)
Subscribers (198851)
This channel features presentations by leading experts in the field of information security. From application, computer, network and Internet security to access control management, data privacy and other hot topics, you will walk away with practical advice for your strategic and tactical information security initiatives.