Ransomware: Prevention, Response, and Recovery
Ransomware attacks are at unprecedented levels; be prepared (Presentation in English)
BEKIJK HET WEBINAR
Duur: 30 minutes
Strategies for the before, during, and after of an attack
In a recent survey of 1,000 Microsoft 365 administrators worldwide, nearly half indicated they had faced a ransomware attack in the last year. Other studies have forecasted that by 2025, 75% of organizations will face one or more ransomware attacks.
It’s clear—anyone responsible for safeguarding organizational data MUST implement robust security policies and mechanisms specifically to ward off these cyberattacks. As recent events have shown, this needs to include assessing the risk from and across your vendor supply chain.
Prudence also dictates implementing robust response plans to mitigate organizational and reputational risk in the ever-increasing likelihood of a successful attack.
Finally, it is imperative to have a ransomware recovery solution in place to ensure business continuity and day-to-day operations remain unaffected. The cost of downtime can be even more costly than paying a ransom, so we will show you how to avoid both with ransomware recovery best practices.
Featured Speakers
Dana Simberkoff
Chief Risk, Privacy, and Security Information Officer, AvePoint
Henry Feliu
Manager, Information Technology, AvePoint
James Nankervis
Information Security and Privacy Analyst, AvePoint
Alex Varvel
IT Administrator, AvePoint
In this webinar you will learn:
Technology Best Practices
How to use Microsoft 365 security solutions like Microsoft Defender to protect against ransomware; solutions for evaluating third-party risk and how to recovery from ransomware with third-party cloud backup solutions.
Policy Best Practices
How you can implement policies to reduce the likelihood of a successful attack. We will also show the must have components of a ransomware response plan.
People Best Practices
How to build a successful security, privacy and ransomware response team. How to build a culture of security with proactive training and communications.