Ransomware: Step-By-Step Response And Remediation Plan

with
Art Taryan
On-Demand
$149.00
Training Includes:
  • Certificate of Attendance
  • All resources and training materials
  • An on-demand recording will be available after the live presentation.

Cybersecurity consultant Art Taryan will explain why ransomware attacks work and how to thwart them. You will learn what steps you need to take today to protect your organization and prepare to respond.

Topics covered

  • What is ransomware? How does it function?
  • What is the typical threat actor attack chain?
  • What is the current ransomware threat landscape?
  • How can organizations prepare for ransomware?
  • How should you respond to ransomware?
  • How can your organization recover from an attack?
  • What are the best practices from private industry?
  • What steps does the federal government recommend you take?

Training Overview

Would you pay a ransom? Plan your cyberattack response today.

Ransomware attacks are no longer rare or random—they are frequent, carefully planned, and highly targeted. Your organization could easily be the next Colonial Pipeline or JBS Foods.

You need to decide today how you would respond. After taking the critical steps necessary to protect your organization, you must determine what to do when defenses fail. By understanding how these attacks work, the goals of the hackers behind them, and your options, you can more calmly respond fueled by planning and logic instead of urgency and emotion.

The immediate steps you take can reduce losses, help investigators, protect your stakeholders, and preserve your reputation.

  • What is ransomware? How does it function?
  • What is the typical threat actor attack chain?
  • What is the current ransomware threat landscape?
  • How can organizations prepare for ransomware?
  • How should you respond to ransomware?
  • How can your organization recover from an attack?
  • What are the best practices from private industry?
  • What steps does the federal government recommend you take?

Who Should Attend?

  • Security stakeholders involved in operations and strategy
  • Individuals responsible for ransomware response throughout an organization
  • Financial institution personnel
    • Executives
    • Operations managers
    • Electronic banking managers
    • Information security officers
    • Risk management staff
  • Business leaders
    • Corporate executives
    • Information security officers
    • Information technology personnel
    • Public relations managers
    • Small business owners
  • Higher education administrators
    • Presidents
    • Chancellors
    • Provosts
    • Vice presidents for administration
    • Information security team members
  • School leaders
    • Superintendents
    • Deputy, associate, and assistant superintendents
    • Principals and heads of private schools
    • Directors of technology
    • Public information officers
    • School board members

Expert Presenter

Art Taryan

  • 14 years of experience in risk/threat and project management within multiple Fortune 500 companies and the US military
  • Focuses on cyber threat intelligence, threat modeling, insider threat, incident response, and counter fraud
  • Leads the threat intelligence efforts within Cross Country Consulting’s Cyber & Privacy group
  • Previously an Army officer, including supporting real-world defensive and offensive cyber operations alongside the NSA

For Teams

Have a team that needs training? Our enterprise customers receive custom branding, reporting and analytics tools, and of course, preferred pricing.