Session

Rewinding the Ransomware Attack: Lessons from the Incident Timeline

Ransomware rarely starts with encryption. This session follows a ransomware attack from initial probing and phishing through compromise, lateral movement, and the ransom trigger using real-world attack patterns drawn from years of incident response experience. We then rewind the incident to examine the controls, detections, and response actions that could have interrupted the attack earlier, while also covering strategies to minimize damage and accelerate recovery.

Ben Dumke

Lawrence University - Senior Network & Systems Manager

Neenah, Wisconsin, United States

Actions

Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.

Jump to top