Ransomware

Ransomware Has Evolved, And So Should Your Company

On-Demand Webinar

Right now, a cybercriminal gang like Prometheus, Maze, Ryuk, or NetWalker could be looking for vulnerabilities in your network to launch a Ransomware attack.

Ransomware is typically initiated via phishing or social engineering tactics, these attacks often take advantage of human error for the successful delivery of the malware. These criminal organizations are impartial to the size of your organization. They target any company with data, and if you don’t pay the ransom, your information could be posted to a public forum or sold on the Dark Web for profit. Most companies unfortunately are forced to pay due to system failure and file corruption.

The scariest about these methods is that the Ransomware doesn’t need to be developed by the attackers. Ransomware services can now be purchased on the DarkWeb and used at the Cybercriminal’s will (RAAS). As these Ransomware attacks and services evolve, how can companies arm themselves with the right solutions to defend themselves from these ever-growing attacks?

Join Dr. Christine Izuakor (cybersecurity expert) and Jay Godse (head of product dev at Veriato) as they discuss:

  • Ransomware 101
  • The Colonial Pipeline Breach
  • Ransomware As A Service
  • Anti-virus is not enough
  • Ransomware detection and prevention
Dr. Christine Izuakor

Dr. Christine Izuakor

Senior Manager of Global Security Strategy and Awareness - United Airline

Dr. Izuakor is the Senior Manager of Global Security Strategy and Awareness at United Airlines where she plays a critical part in embedding cyber security in United’s culture. She is an adjunct professor of cyber security at Robert Morris University, and independently helps corporations solve a diverse range of strategic cybersecurity challenges.

Jay Godse

Jay Godse

Head of Product & Technology

Jay Godse is the Head of product and technology of Awareness Technologies. He has over 15 years’ experience in building enterprise scale SaaS businesses that are focused on Information Security and regulatory compliance. He brings deep expertise in developing security programs for large enterprises as well as SMBs.

Get Instant Access

Employee Monitoring Resources

The Human Centric Approach to Data Loss Prevention

The Human Centric Approach to Data Loss Prevention

In today’s work-from-anywhere organization, a data loss prevention (DLP) strategy is more essential than ever. A critical part of DLP strategy is to understand the intent behind why people move files, email spreadsheets, print documents and upload files outside your...

Strengthening Your Insider Risk Program

Strengthening Your Insider Risk Program

Insider risk has increased 47% in the past two years. Theft, data leakage, hacking - insider risk is a real threat to your bottom line. It comes from employees and others granted access to your internal systems, and most companies do not have the technology or...