The decisions made in the seconds, minutes, and hours of a security breach carry long-term operational, legal, regulatory, and public relations repercussions. Making the wrong move in the heat of the moment can cost a fortune; it can even end a career. Featuring real-world best practices from the breach response team responsible for defending hundreds […]Read more
A Technical Deep Dive Into: Supply Chain Based Triple Extortion Ransomware with DDoS and Scrambled Voice Phone Blackmail and A Review of Successful Prevention Tactics and Strategies
This talk will technically review the latest Supply Chain and Ransomware attacks, some new Financial Sector Specific threats, the steep rise in “Triple Extortion Events” and the advanced and automatic requirements for event prevention strategy and tactics. This presentation will use public and anonymized private information as well as technical analysis from Check Point Research. […]Read more
Enter your contact information below to have future blog posts delivered directly to your inbox!