Session
Surviving a Ransomware Attack: Notes from the Field
From Enterprise Admin credentials being leaked to a limited access breach, we will go into detail four different Ransomware attacks. We look at the attackers approach, the DR solutions in place, and what was ultimately required for a complete recovery. This session is a great opportunity to learn from others' mistakes, and ensure you're taking the right steps to protect your important data.
Please note that Sessionize is not responsible for the accuracy or validity of the data provided by speakers. If you suspect this profile to be fake or spam, please let us know.
Jump to top