Webinar August 11th 2022: Ransomware Labs

Learn how ransomware behaves so you can better defend against it. Ransomware operations have transformed dramatically over the last few years from a small cottage industry conducting largely nuisance attacks to a highly complex business model that is extremely efficient and specialized with an increasing level of innovation and technical sophistication.

With the new Cybereason Ransomware Range experience, you will have the chance to witness first-hand the RansomOps techniques employed by threat groups from initial intrusion, lateral movement, privilege escalation to full network compromise. Most importantly, you’ll see where and how these operations can be predicted, detected, and stopped dead in their tracks.

August 11th

5PM CEST / 4PM BST / 11AM ET

REGISTER HERE

We’ll explore strains of increasing degrees of complexity and sophistication - including:


NOTE: Attending these sessions qualifies you for a Continuing Professional Education (CPE) credit, a requirement to maintain CISSP certification. To receive credit, attend the full live session to receive your confirmation email of attendance.

Speakers

ken-westin-circle-hs

Ken Westin

KEN WESTIN, DIRECTOR OF SECURITY STRATEGY, CYBEREASON

Ken Westin has been in security for over 15 years working with companies on threat hunting, insider threat programs, and vulnerability research. In the past, he has worked closely with law enforcement helping to unveil organized crime groups. His work has been featured in Wired, Forbes, New York Times, Good Morning America, and others, and is regularly reached out to as an expert in cybersecurity, cybercrime, and surveillance.