Editorial/Expert Series Expert Series By ActualTech Media Ransomware Tripwires: Monitoring for Threats
Featuring
About This Expert Series
Ransomware attacks are slow, and then fast. Research consistently shows that sophisticated attackers have relatively long dwell times, breaking into systems and accounts and then moving laterally around the network and connected cloud services for weeks or months to gather intel and lay the groundwork for a successful ransomware attack.
Smart IT operators set a lot of tripwires for attackers to stumble across to give themselves ample warning. From alerts of break-in attempts, to notifications of potential lateral movement, to high priority alarms and automated action when ransomware encryption is taking place, tripwires are essential to ransomware defense.
Attend this editorial webinar as an expert guides you on a tour of best practices and considerations in monitoring for ransomware threats. Don't miss this installment in the year-long Expert Series on ransomware from ATM and Ransomware.org.
-
Host Keith Ward Webinar Moderator ActualTech Media
-
Featuring Allan Liska Ransomware Expert and Industry Veteran ActualTech Media
-
Featuring To Be Announced Keeper Security
-
Featuring To Be Announced CrowdStrike
-
Featuring To Be Announced Rubrik
-
Featuring To Be Announced Duo Security
What You'll Learn
- Discover critical types of tripwires in a ransomware defense
- Learn how to most effectively monitor ransomware tripwires
- Find out what to do when an alert suggests a ransomware actor is in your environment
- Pick up on common causes of false positives
- Get your ransomware questions answered by an expert!