Ransomware has become one of the fastest-growing cyber threats faced by enterprises today, not to mention municipal governments, hospitals and schools. What are the most common ways that ransomware gets into systems, and how can you limit the possibility of infection? If you are infected, what steps should you take to mitigate the problem, and how should you deal with the perpetrators? This webinar will answer these questions and many more, providing expert advice on how to stop ransomware from infecting your critical systems and data --and what to do if your defenses fail.
John Pironti, President at IP Architects
John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.
Guy Propper, Threat Intelligence Team Leader at Deep Instinct
Guy Propper is the team leader of the Threat Intelligence Team at Deep Instinct, with a wealth of experience in the cyber security world. Guy has several years of cyber security experience in an elite technological operational unit in the Intelligence department of the Israeli Defense Force, and he holds a B.Sc. in Biology and Cognitive Science from the Hebrew University in Jerusalem.
Sara Peters, Senior Editor at Dark Reading
Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.