LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated Ransomware
Human Operated Ransomware (HORA) threat groups are growing in number and strength every day. In this Webcast, SANS Instructor Ryan Chapman will cover the evolution of, tactics inherent to, and threats associated with HORA. Ryan will provide "quick wins" that you can implement now to protect yourself against this ugly threat. Ryan will also focus on what to do if ransomware is running *right now*, along with what to do when ransomware has run and the outlook is bleak. Ryan will wrap up the Webcast with a list of digital forensics and incident response tools that work well within on-prem and cloud-based environments alike. Are you and your company prepared for this looming threat?
Speaker Bio
Ryan Chapman is a hacker, consultant, speaker, and trainer. He works as a Principal Incident Response Consultant for BlackBerry (formerly Cylance). Ryan also teaches SANS FOR610: Reverse Engineering Malware and is the lead organizer for CactusCon, Arizona's hacker conference. He has a zest for life-long learning and loves to present, having presented talks and workshops at conferences such as DefCon, BSides, CactusCon, Splunk .Conf, and more. With Ryan, it's all about the blue team!
Видео LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated Ransomware канала SANS Digital Forensics and Incident Response
Speaker Bio
Ryan Chapman is a hacker, consultant, speaker, and trainer. He works as a Principal Incident Response Consultant for BlackBerry (formerly Cylance). Ryan also teaches SANS FOR610: Reverse Engineering Malware and is the lead organizer for CactusCon, Arizona's hacker conference. He has a zest for life-long learning and loves to present, having presented talks and workshops at conferences such as DefCon, BSides, CactusCon, Splunk .Conf, and more. With Ryan, it's all about the blue team!
Видео LOCKED OUT! Detecting, Preventing, & Reacting to Human Operated Ransomware канала SANS Digital Forensics and Incident Response
Показать
Комментарии отсутствуют
Информация о видео
13 ноября 2020 г. 3:00:21
00:56:32
Другие видео канала
![](https://i.ytimg.com/vi/n1x0IApdbCc/default.jpg)
![Hunting and Scoping A Ransomware Attack](https://i.ytimg.com/vi/h076AA1ZroY/default.jpg)
![Using WhatsApp for Malware Persistence](https://i.ytimg.com/vi/yaGPWmvjKu4/default.jpg)
![Practical Threat Hunting With Machine Learning](https://i.ytimg.com/vi/JYwy4MOGOkc/default.jpg)
![How Companies Catch Ransomware Hackers](https://i.ytimg.com/vi/ZjQ76eilt6E/default.jpg)
![SOC 101: Real-time Incident Response Walkthrough](https://i.ytimg.com/vi/2BOOl8_nwjQ/default.jpg)
![How to stop ransomware BEFORE it starts](https://i.ytimg.com/vi/AE0L85nP_ls/default.jpg)
![Ransomware Preparation, Containment and Recovery Strategies](https://i.ytimg.com/vi/a5nnrCY8VX8/default.jpg)
![Ransomware incident response plan | Cybersecurity leadership](https://i.ytimg.com/vi/ujbrem5yXP4/default.jpg)
![Common misconceptions and mistakes made in Threat Hunting](https://i.ytimg.com/vi/6NmMPJ0OIls/default.jpg)
![ATT&CK® Deep Dive: How to Detect Rootkits](https://i.ytimg.com/vi/Kmq9TFXdkg4/default.jpg)
![Digital Forensics: How Malware Can Hide In Plain Sight](https://i.ytimg.com/vi/_etwhGu0Ddw/default.jpg)
![All Things Entry Level Digital Forensics and Incident Response Engineer DFIR](https://i.ytimg.com/vi/Cst8K64j5_Y/default.jpg)
![Kaspersky vs Ransomware](https://i.ytimg.com/vi/aoNkyD03PaQ/default.jpg)
![Universities Are Getting Destroyed By Ransomware](https://i.ytimg.com/vi/OOIwILd5yXw/default.jpg)
![Anchor, Bazar, and the Trickbot Connection](https://i.ytimg.com/vi/C5CgfhDil6U/default.jpg)
![Windows Forensics: Event Trace Logs - SANS DFIR Summit 2018](https://i.ytimg.com/vi/TUR-L9AtzQE/default.jpg)
![Tracking Ransomware End to End](https://i.ytimg.com/vi/RV2tcc6e168/default.jpg)
![Investigating Malware Using Memory Forensics - A Practical Approach](https://i.ytimg.com/vi/BMFCdAGxVN4/default.jpg)
![Tips for Your Ransomware Incident Response Plan](https://i.ytimg.com/vi/SbE3FENzZL0/default.jpg)