Session
Rewinding the Ransomware Attack: Lessons from the Incident Timeline
Ransomware rarely starts with encryption. This session follows a ransomware attack from initial probing and phishing through compromise, lateral movement, and the ransom trigger using real-world attack patterns drawn from years of incident response experience. We then rewind the incident to examine the controls, detections, and response actions that could have interrupted the attack earlier, while also covering strategies to minimize damage and accelerate recovery.
Ben Dumke
Lawrence University - Senior Network & Systems Manager
Neenah, Wisconsin, United States
Links
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top