Ransomware continues to evolve and despite what many in the industry had thought was a lull in the use of ransomware by cyber criminals; it hasn’t gone away and has returned with a vengeance.
The “tried and true” source of revenue, projected at $17B in 2020, for cyber criminals now comes with capabilities and new tactics to ensure money is paid by the victims it has been inflicted upon.
Join leaders from Cybereason's Nocturnus research and Incident Response teams as they explore insights based upon what is happening in the underground and their first-hand experience with ransomware attacks encountered in the wild.
This webinar will provide a deep-dive into the current state of ransomware with highlights that include:
- Evolution of ransomware
- Current trends and new tactics
- Lessons from the field
- How to better protect your organization from ransomware
You can also find additional ransomware guidance and resources HERE.
Mor Levi, VP, Global Security Practices, Cybereason
Mor Levi has over 8 years of experience in cyber investigations, incident response, and SIEM/SOC management. She began her career as a team leader in the Israeli Defense Force security operation center. Later, she led an incident response and forensics team at one of the big four accounting firms providing services to global organizations.
Assaf Dahan, Head of THREAT Research, Nocturnus
Assaf is a renowned security researcher, with over 15 years of experience in the InfoSec industry. He started his career in the Israeli Military 8200 unit where he acquired extensive experience in offensive security and intelligence work. Later in his career he led red-teams, developed penetration testing methodologies, and specialized in malware analysis and reverse engineering.
About the Author
Cybereason Security Team
The Cybereason Security Team champions cyber defenders by providing future-ready attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a Malop (malicious operation). The result: defenders can end cyber attacks from endpoints to everywhere.