Overview
Current State of Cyber Threats, Cyber Extortion, and the Ransomware Challenge

What are the best ways to protect against ransomware and cyber extortion? How do we give peace of mind to our executive team and board that we are mitigating risk against the numerous threat vectors out there?

Security Controls Covered: Threat Detection, Threat Management, Threat Intelligence, Threat Hunting, MDR, XDR, EDR, Network Security, Incident Response, SIEM, Vulnerability Management, Pen Testing, and Deception

It is no secret that ransomware attacks are at the top of the list of things that keep us, our executives and board members up at night. CISOs know that ransomware is often perpetrated by attackers taking advantage of poor security hygiene. As nasty an attack vector that ransomware is, there are still many other attack vectors we also have to protect against. In this series we will take a look at the current state of cyber threats and consider which controls are best at protecting our systems.

When you register for this event, you are agreeing to our privacy policy. Learn more here: https://www.cisoexecnet.com/privacy-policy

We may also provide contact information in connection with our meetings to exhibitors and sponsors of these meetings. The use of this information is limited to contact in connection with such meetings. By registering for the event you agree to opt in for the sharing of this contact data.

Sponsored by IBM & Okta