Combating Ransomware with Zero Trust
Ransomware attacks have increased by as much as 400% since the beginning of the pandemic, according to the FBI. These attacks no longer affect just the primary target; they cast a wider net by exploiting platforms that directly affect end users. With high-profile ransomware attacks in the headlines, organizations need to take proactive steps to prevent ransomware attacks and have a plan for limiting the damage and restoring normal operations promptly if one does happen.
What the modern threat landscape looks like, from zero-day attacks to ransomware-as-a-service
How ransomware attacks unfold
The immediate steps to take when you detect a ransomware attack
How to minimize damage and restore operations quickly after a breach
How a new approach to security can mitigate the risk of ransomware
Principal Solutions Architect,
Cultural Cyber Security
Venky Raju has a strong background in computer networking, software development, and cybersecurity. He has led R&D teams across the globe developing leading-edge networking solutions, smartphone platforms, and connected applications.
Brian Hay has worked extensively in the area of cybercrime since 2004. He developed the security concept of the “Lifecycle of Cybercrime” by focusing on the activities of organised crime and cyber criminals.
He was Commander of the Queensland Police Fraud & Cyber Crime Group, Chair of the Australia New Zealand Police Advisory Agency’s eCrime Working Group, a pivotal driver of the Australian Cybercrime Online Reporting Network, and member of the Federal Attorney-General’s National Cybercrime Working Group.
Demystifying Zero Trust with Real-life Lessons from the Former Federal CIO
Best practices for Zero Trust Micro-Segmentation and Common mistakes to avoid
How Can CISOs and Security Teams Steer Enterprises to Safety?
Building a Cyber-Resilient Healthcare Organization:
What the C-Suite Needs to Know
Wipro's State of Cybersecurity Report 2020:
Preparing for the New Threat Landscape
Cybersecurity In ANZ
Nation-Sponsored Attacks and Organised Cybercrime
Cyber Risk Quantification:
How CIOs and CISOs can Power Business Efficiency