Hi [[ session.user.profile.firstName ]]

The Rise and Rise of Ransomware: Prepare and Protect

The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

About the presenter:

Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
Recorded Mar 20 2018 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Nick Frost, Principal Consultant, ISF
Presentation preview: The Rise and Rise of Ransomware: Prepare and Protect

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Beyond the Phish: A Snapshot of End-User Behaviour Oct 23 2019 3:00 pm UTC 45 mins
    Gretel Egan, Security Awareness Training Strategist, ProofPoint
    Phishing is one of InfoSec's long-standing threats. But for cybercriminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cybersecurity threats beyond email-based social engineering?

    During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cybersecurity topics and best practices. The report features an analysis of data related to nearly 130 million cybersecurity questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

    We’ll share:

    - The importance of assessing and training end-users about cybersecurity threats beyond email-based social engineering
    - The strengths and weaknesses among end-users across 14 cybersecurity topics, highlighting how end-user knowledge levels vary across industries which provides a benchmark to compare readiness within your organization
    - A more holistic view of susceptibility by looking beyond knowledge assessments and training activities to discover how this data can differ from simulated phishing attacks
    - How you can use this information to reduce the risk of successful cyber attacks within your organization
  • Improving cyber risk conversations with the Board Recorded: Oct 16 2019 48 mins
    Simon Marvel, Partner, Acuity
    According to McKinsey most IT and security executives use manually compiled spreadsheets to report cyber risk data to their Boards; unsurprisingly many Boards are dissatisfied with the reports they receive. Consequently, Boards struggle to get a sense of the overall cyber risk status of the organisation.

    With global spending on cyber security products and services increasing at 8.7% a year, Boards also need assurance that their budgets are being spent well.

    This webinar will provide practical examples of how, with the introduction of some quantitative risk assessment techniques, security leaders can start to improve their conversations with the Board.

    Specifically, the session will demonstrate:

    •Forecasting future financial loss exposure from cyber events
    •Prioritisation of security programmes in terms of forecast reduction in financial loss exposure
    •Evaluating the RoI of security investment proposals.
    The webinar will conclude with some suggestions on how security leaders can start to introduce these techniques and then evolve them through monitoring and continual improvement.
  • Combining human-centred approaches with AI in information security Recorded: Oct 9 2019 45 mins
    Richard Absalom & Daniel Norman
    In the majority of data breaches, human error is blamed. Humans are frequently regarded as the ‘weakest link’ in information security, but organisations have not aimed to understand the reasons why humans make mistakes and are easily coerced by attackers.

    Organisations can take both human-centred and technological steps to mitigate human fallibility: encouraging good security practice at the same time as deploying intelligent systems that learn and analyse activity and behaviour, providing alerts when an attack is imminent.

    In this webinar, ISF research analysts Daniel Norman and Richard Absalom will:

    •explain why humans are a weak link in security but also a key part of the solution – and how human-centred techniques can help
    •provide clarity on what AI really is, and what it can and cannot do for information security
    •pose questions on the extent to which AI could and should monitor networks and people to provide security.
  • Data Protection 2020 - The risk of personal data exposure Recorded: Oct 1 2019 46 mins
    Stephane Charbonneau, Founder & Chief Technology Officer for Titus
    The risk of exposure of personal data has become a growing concern to organizations globally throughout the last several years. While many organizations have made efforts to build a culture of privacy and perhaps a security ecosystem that supports that, many challenges remain on the execution of mitigating such a concern.
    For those organizations who have yet to build out such a program, and those who have done so unsuccessfully, the question becomes, how can we create a privacy program that works for our business?
    The journey to a robust privacy solution has several requirements.
    Join Stephane Charbonneau, Founder & Chief Technology Officer for Titus to learn:
    •Data Protection 2020, the risk of personal data exposure
    •How to ensure compliance with an ever-changing regulatory mandate landscape
    •How to enable a frictionless user experience and optimized workflow to your end users
    •How to tie the technologies in your privacy ecosystem together to protect your most valuable data.
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response Recorded: Aug 22 2019 44 mins
    Daniel Norman, Research Analyst, ISF
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • Optimising your SOC – put your best foot forward with threat intelligence Recorded: Jul 17 2019 47 mins
    Dr Emma Bickerstaffe, Senior Research Analyst
    Threat intelligence is an imperative element of a successful Security Operations Centre (SOC). It provides SOC analysts with situational awareness and actionable insights to accelerate security analysis and prevent security incidents.

    Drawing on the practical experiences of ISF Member organisations, Emma will share how threat intelligence can be effectively harnessed by a SOC to enable proactive decision-making.
  • GDPR One year later: Is a Risk-Based Approach to Data Privacy possible? Recorded: May 20 2019 45 mins
    Simon Rycroft, Principal Consultant, ISF and Kashif Barlas, Senior Consultant, ISF
    With businesses streamlining processes and automating customer service through outsourced arrangements, the volume and content of electronically transmitted personal data records has increased beyond all previous estimates. The sharing of special categories of data between businesses and their suppliers has become the norm, sometimes without adequate protection for the individual’s privacy in breach of the GDPR. Where there are hundreds of supplier contracts, it is not pragmatic for an organisation to review and tighten all these contracts immediately in the wake of the GDPR, however a risk-based approach can certainly reduce the compliance burden upon existing teams.

    In this seminar, we introduce the concept of a minimum viable product for this aspect of data privacy and describe how it can be aligned with an organisation’s risk appetite and agreed before prioritising and mitigating data privacy risks.
  • Threat Horizon 2021 Recorded: Apr 4 2019 47 mins
    Steve Durbin, Managing Director, ISF LTD
    Driven by demands for increased speed, automation and efficiency, organisations are about to face a period of significant technological upheaval. Digitisation promises much, and development of the next generation of technologies will bring significant benefits to business and society. To survive in the digital world organisations will have to adapt. To thrive, they will need to evolve. Exploiting digital interconnectivity, competing in the digital arena while understanding the implications of a digital cold war will all become business as usual challenges for industry over the coming months and years.

    In this webinar, Steve Durbin, Managing Director, ISF will identify the key changes to the digital landscape over the next two years, focusing on emerging threats and means of mitigating their impact.
  • What do you get when you cross a CEO and a CISO’s strategy Recorded: Mar 19 2019 45 mins
    Mark Chaplin, Principal, ISF
    While the board ‘get cyber’, questions remain around embedding cyber risk management into business strategy execution. For many CISOs, strategy alignment represents the best opportunity to engage with the board and ensure a business-driven approach to managing cyber risk.

    So how should business leaders develop, update and execute business strategy with so many cyber-related implications? How can organisations meet their business goals, against a backdrop of increasing cybersecurity costs, greater regulatory scrutiny and increased frequency and magnitude of data breaches?

    In this webinar, Mark Chaplin, Principal, ISF will discuss the significance of aligning security strategy with business strategy. Mark will draw on executive engagement, exploring the essential factors for success and highlighting the pitfalls to avoid.
  • Delivering an Effective Cyber Security Exercise: Enhanced Breach Response Recorded: Feb 20 2019 45 mins
    Daniel Norman, Research Analyst, ISF
    Organisations are constantly under threat with over two-thirds of them experiencing data breaches in 2018. As a result, preparedness and resiliency are paramount to protecting an organisation’s information from cyber attacks.

    Business leaders and their security teams can improve their ability to handle cyber attacks by running cyber security exercises. These exercises should help the organisation identify areas of improvement in people, process and technology, reducing the impact should a real cyber attack occur.

    In this webinar Daniel Norman, Research Analyst, ISF will share how organisations should approach running internal cyber security exercises to support breach identification, prevention and response.
  • Emerging Cyber Threats for 2019 Recorded: Dec 11 2018 47 mins
    Steve Durbin, Managing Director, ISF LTD
    Organisations in 2019 will be increasingly faced with a hyper-connected world where the pace and scale of change – particularly in terms of technology – will accelerate substantially. Business leaders need to develop cutting-edge ways to deal with new regulation, advanced technology and distorted information.

    In this webinar, Steve Durbin, Managing Director, ISF will discuss the threats organisations will be facing in 2019 and how business leaders and their security teams can address them. The emerging cyber threats to lookout for include:

    -The increased sophistication of cybercrime and ransomware
    -The impact of legislation
    -The myth of supply chain assurance
    -Smart devices challenge data integrity

    About the presenter

    Steve Durbin is Managing Director of the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • Security in the Cloud: Identity Management, Access Control and Authentication Recorded: Oct 23 2018 44 mins
    Emma Bickerstaffe, Senior Research Analyst and Benoit Heynderickx, Principal Analyst, ISF LTD
    Organisations increasingly rely on cloud services, motivated by the benefits of scalability, accessibility, flexibility, business efficiencies and reduced IT costs. However, there are several security implications that organisations need to address, including the challenge of verifying identity and managing access to cloud services.

    Cloud services bring added complexity to identity and access management, exacerbated by the distribution of data across a myriad of applications accessed by users from multiple devices and locations. Failure to adequately implement user authentication and access control in the cloud can be exploited by attackers to gain access to users’ credentials, manipulate systems and compromise data.

    In this webinar, Senior Research Analyst Dr Emma Bickerstaffe and Principal Analyst Benoit Heynderickx will discuss identity management, access control and user authentication in the cloud environment, and consider how organisations can effectively tackle this security concern.
  • A Data Breach Prevention, Detection & Response Strategy to Combat Todays Threats Recorded: Sep 18 2018 47 mins
    Nick Frost, Principal Consultant, ISF LTD
    With the ever-increasing frequency and sophistication of security threats to organisations, business leaders need to have a comprehensive data security strategy to protect themselves. Information security practitioners have to think and plan beyond existing protection capabilities that are aimed at preventing threats only. Today's cyber security strategies need to protect an organisations mission critical assets in a way that is:

    ‒ balanced, providing a mixture of informative, preventative and detective security controls that complement each other
    ‒ comprehensive, providing protection before, during and after threat events materialise into security incidents
    ‒ end-to-end, covering the complete information life cycle.

    This will enable organisations to match the protection provided with the sophistication of threats to such mission critical information assets. This webinar will look at past and present models and share ideas on how organisations can ‘future proof’ their strategies to combat next generation threats.

    In particular in this webinar, Nick Frost, Principal Consultant at the ISF will discuss what actions can be taken to identify your most critical information assets, and how a modern day cyber security model needs to focus on prevention and detection of a data breach, and how to respond to a breach in order to reduce damage to brand and reputation.
  • Protecting Against Ransomware Recorded: Jun 6 2018 45 mins
    Nick Frost (Principal Consultant, ISF) | Raja Mukerji (ExtraHop) | Patrick Grillo (Fortinet) | Rob McGovern (LogRhythm)
    What are the lessons learned from the biggest ransomware attacks to date (Wannacry, NotPetya)? How are organizations preparing against the next big attack?

    Join top security experts for this interactive Q&A discussion on:
    - Trends in ransomware attacks
    - Backups, patches and other ways to protect your data
    - How to bolster your organization's security culture
    - Other threats on the horizon

    Speakers:
    - Nick Frost, Principal Consultant, Information Security Forum (ISF)
    - Raja Mukerji, Co-Founder and President, ExtraHop
    - Patrick Grillo, Senior Director Solutions Marketing, Fortinet
    - Rob McGovern, Technical Product Manager, LogRhythm

    The session will be streamed LIVE from London from the Infosecurity Europe conference.
  • GDPR: Cutting Through the Noise Recorded: May 24 2018 47 mins
    Alex Jordan, Senior Analyst, ISF LTD
    Data protection has always been important, but with the GDPR deadline looming and data sharing scandals shaking consumer confidence, securing personal data has never been more vital. The GDPR is leading businesses across the world to evaluate, and in many cases modify their data processing activities in line with upcoming law.

    So what if you’ve left it too late? What are the key steps you can take to work towards GDPR compliance, even after deadline day?

    Join us in this webinar with Alex Jordan, Senior Analyst at the Information Security Forum as he shares:

    -The ISF’s phased approach to GDPR implementation
    -Ways to determine the criticality of data and how to protect it appropriately
    -The urgent actions that a business can take to get GDPR compliance started
    -Common myths surrounding the GDPR, and guidance on cutting through the noise.
  • The Board's Role in Balancing Risk & Reward Recorded: Apr 26 2018 46 mins
    Steve Durbin, Managing Director, ISF LTD
    Cyber has become a strategic issue and for many companies is now a business enabler and increasingly a form of competitive advantage. However it is clear that it remains difficult for Board's to get the “right” management information to support their cyber risk discussions and decision making.

    So how can Board's ensure that they are asking the right questions when it comes to an organisation’s cyber posture and how can CISOs maintain and improve the Board’s attention in this fast-moving space? This webinar will look at the challenges faced by CISOs and Board members and offer insights into how to successfully approach cyber security at Board level.

    About the presenter:
    Steve Durbin is Managing Director at the Information Security Forum (ISF). His main areas of specialism include strategy, information technology, cybersecurity and the emerging security threat landscape across both the corporate and personal environments.
  • The Rise and Rise of Ransomware: Prepare and Protect Recorded: Mar 20 2018 49 mins
    Nick Frost, Principal Consultant, ISF
    The expectation from the start of 2017 – that we hadn’t seen the back of ransomware – was justified. 2017 was plagued with global attacks such as Petya, WannaCry, Bad Rabbit and many others. Unfortunately, 2018 could be even worse.

    With ransomware continuously developing new delivery techniques, organisations must learn how to prepare and protect themselves from the threat of ransomware, but how can they do this?

    In this webinar, Nick Frost, Principal Consultant at the ISF, will explore the latest threats in ransomware and what organisations can do to minimise vulnerabilities to reduce risks of an attack.

    About the presenter:

    Nick is currently the Principal Researcher for the Information Security Forum (ISF) Ltd. He has more than 15 years’ experience designing and implementing a risk-based approach to securing information. He has developed leading solutions for evaluating risk across both internal and supplier environments.
  • Emerging Cyber Threats for 2018 Recorded: Nov 16 2017 47 mins
    Steve Durbin, Managing Director, ISF Ltd
    While cyberspace continues to provide opportunities for organisations they risk becoming disorientated and losing their way in a maze of uncertainty, as they grapple with complex technology, proliferation of data and increased regulation.

    In this webinar Steve Durbin, Managing Director, ISF, discusses the threats organisations will be facing in 2018 and offers insights into how to address them.
  • Protecting your Organisation Against the Evolving Threatscape Recorded: Oct 24 2017 41 mins
    Steve Durbin, Managing Director, ISF LTD
    Technology will underpin all aspects of modern society by 2019, profoundly impacting the way people live and work. Business leaders face a stark dilemma; should they rush to adopt new technology and risk major fallout if things go wrong; or wait and potentially lose ground to competitors. Organisations that are well informed about emerging technologies and corresponding threats will be best placed to make winning decisions.

    In this webinar, Steve Durbin, Managing Director, ISF, will examine the threats that organisations will be dealing with over the next two years and will provide advice on the best ways of handling them.
  • Identifying & Protecting your Organisation's Critical Information Assets Recorded: Sep 19 2017 46 mins
    Mark Chaplin, Risk Management Specialist, ISF
    Mission critical assets can represent 80% of an organisation's total value. As critical assets are not always obvious, few organisations understand the extent to which these are exposed and need to be protected.

    In this Webinar, Steve Durbin, Managing Director of the ISF, explains how to:
    •identify an organisations mission critical information assets and the greatest threats to them
    •determine how to counter adversarial threats
    •determine the right protection to put in place and how to implement these protections.
    .
Live monthly webcasts for CISO’s and business leaders
Steve Durbin, Managing Director of ISF Ltd and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..."
We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams.

1. Emerging Cyber Threats (ISF Threat Horizon annual series)
2. The role of the CEO and business leaders in cyber security
3. Being a successful CISO
4. Cyber-attack trends
5. Critical Asset Management
6. Data breach prevention
7. Supply chain
8. Insider Threat and the role of the end user

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The Rise and Rise of Ransomware: Prepare and Protect
  • Live at: Mar 20 2018 1:00 pm
  • Presented by: Nick Frost, Principal Consultant, ISF
  • From:
Your email has been sent.
or close