Ransomware

The Rise of Ransomware As A Service (RAAS) Webinar

On-Demand Webinar

How criminals extort businesses using RansomWare services from the DarkWeb.

One of the biggest trends in technology over the last decade has been the growth of subscription-based service models or “SaaS”. Instead of installing software directly in corporate environments, companies providing customers with the ability to effectively rent access to services they need without dealing with development and maintenance.

Given the high demand for RansomWare in this day and age, creative cyber-criminal entrepreneurs followed this industry trend and created RansomWare As A Service (RaaS) to ease the burden of cyber attackers having to develop their own attacks.

Join Nick Cavalancia from Techvangelism and Cyber Security Expert, Dr. Christine Izuakor as we discuss:

  • How does RansomWare as a Service (RaaS) work?
  • Examples of RansomWare As A Service (RaaS) provider
  • If RaaS impacts you, what can you do?
  • RansomWare detection & protection tools
Nick Cavalancia

Nick Cavalancia

Chief Techvangelist

Nick Cavalancia has over 20 years of enterprise IT experience, 10 years as a tech marketing executive and is an accomplished technology writer, consultant, trainer, speaker, and columnist.

Dr. Christine Izuakor

Dr. Christine Izuakor

Senior Manager of Global Security Strategy and Awareness - United Airline

Dr. Izuakor is the Senior Manager of Global Security Strategy and Awareness at United Airlines where she plays a critical part in embedding cyber security in United’s culture. She is an adjunct professor of cyber security at Robert Morris University, and independently helps corporations solve a diverse range of strategic cybersecurity challenges.

Get Instant Access

Employee Monitoring Resources

The Human Centric Approach to Data Loss Prevention

The Human Centric Approach to Data Loss Prevention

In today’s work-from-anywhere organization, a data loss prevention (DLP) strategy is more essential than ever. A critical part of DLP strategy is to understand the intent behind why people move files, email spreadsheets, print documents and upload files outside your...

Strengthening Your Insider Risk Program

Strengthening Your Insider Risk Program

Insider risk has increased 47% in the past two years. Theft, data leakage, hacking - insider risk is a real threat to your bottom line. It comes from employees and others granted access to your internal systems, and most companies do not have the technology or...