Technology Alone Can’t Stop Cyberattacks: Your Guide to Human-Led Threat Hunting Join Bill Brenner, CRA VP of content strategy, and Dana Jackson, CRA VP of research, for a look at where security teams continue to struggle, which tools have proven most helpful, and where they will make investments in the coming year. In October 2022, 200 security practitioners participated in a CRA BI study on efforts to battle ransomware. This brief will cover CrowdStrike’s latest and most relevant intelligence trends pertaining to criminal cyber threat actors, ransomware capabilities, and their associated tactics, techniques, & procedures (TTPs). Jason Rivera: Director, Strategic Threat Advisor Group, CrowdStrike Translate outcomes into artifacts that enable business stakeholders to easily understand your strategy and increase investment in future resources.Į-Crime & ransomware threat landscape overview.Uncover vulnerabilities in your infrastructure and social engineering avenues that adversaries commonly target.Leverage findings to strengthen your incident response playbooks, security controls, and systems.Design emulation exercises using the same tactics, techniques, and procedures as real-world adversaries.Join the offensive security experts from Bishop Fox as they break down how to develop a real-world ransomware attack testing methodology and then reap the benefits. We will also delve into how to prepare a value map of your Incident Response investments to show ROI to the board and C-suite as well as illustrate the value of, and build consensus for, recommended improvements. Join our session to see how real-world attack emulations not only help you find opportunities to improve your security controls such as detection and prevention techniques, but also the blue team’s processes for the current state of preparedness. The fact is the only way to know your ransomware defenses are effective is to either experience a real-world attack – or better yet, to emulate one using the same playbooks the criminal gangs use. Have you gotten this question from your leadership? How do you answer it? How do you know? “What is our ransomware strategy, and how are you evaluating if it works?” Tom Eston: AVP of Consulting, Red Team Practice Director, Bishop Fox Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks Questions abound: How does one trade cryptocurrency? How to account for payment? Are you breaking the law? Join this session for an informative look at the many critical considerations that companies must take into account when ransomware strikes. Not preparing effectively risks delays and further problems. Paying ransoms, typically in cryptocurrency, requires organizations to develop technical, legal and corporate processes and infrastructure before they are needed. Organizations may decide there’s no choice but to pay up. Paying may invite further attacks, but taking a “no payment” position can mean losing access permanently to systems and data. Lance Hayden, PhD, Chief Information Security Strategist, VericastĪmong the key decisions one is faced with when contending with a ransomware attack is whether or not to pay.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |