Feds Fighting Ransomware: How the FBI Investigates and How You Can Help
Joel DeCapua, Special Agent, FBI
It seems that almost every week there is a new report about a ransomware infection impacting a major enterprise. What has the FBI done to combat ransomware? What is the FBI’s strategy moving forward? And how can the security community collaborate with law enforcement? Join us as your friendly neighborhood FBI agent discusses the tools and tradecraft used to investigate ransomware actors.
Видео Feds Fighting Ransomware: How the FBI Investigates and How You Can Help канала RSA Conference
It seems that almost every week there is a new report about a ransomware infection impacting a major enterprise. What has the FBI done to combat ransomware? What is the FBI’s strategy moving forward? And how can the security community collaborate with law enforcement? Join us as your friendly neighborhood FBI agent discusses the tools and tradecraft used to investigate ransomware actors.
Видео Feds Fighting Ransomware: How the FBI Investigates and How You Can Help канала RSA Conference
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
Behind the booming ransomware industry: How hackers hold businesses hostage | Business BeyondHacking Exposed: Global Threat BriefA Discussion on Ransomware with the Acting CISA DirectorHow the NSA betrayed the world's trust -- time to act | Mikko HypponenSamy Kamkar (Hacker) | TNW Conference | Secret Hacking TechniquesLOCKED OUT! Detecting, Preventing, & Reacting to Human Operated RansomwareThe Five Most Dangerous New Attack Techniques, and What's Coming NextRansomware attacks on the rise: Should companies and organisations pay?The 5 Most Dangerous New Attack Techniques and How to Counter ThemTwo Weeks with a Russian Ransomware CellInside the November FBI Ransomware Alert - See Real Images of Ryuk Ransomware in Action!Experts Take On Hacker Burner Phones32C3 - How the Great Firewall discovers hidden circumvention serversRansomware-as-a-Service GangsThe Five Most Dangerous New Attack Techniques and How to Counter ThemEconomics of Medical Device CybersecurityShmooCon 2014: The NSA: Capabilities and CountermeasuresThe NSA Playset: A Year Of Toys And ToolsRansomware: Creation, Detection, and ResponseDon’t Wake Up to a Ransomware Attack