Outsmarting Ransomware: Hints and Tricks

About this webinar

Recorded: August 24, 2017

Microsoft has been working hard to patch Windows operating systems against the EternalBlue exploit to help shield organizations from threats such as Petya, WannaCry and other ransomware. But as long as employees keep opening phishing emails and clicking inappropriate links, and attackers keep dreaming up new attack vectors, your organization will remain vulnerable to cyber attack. It’s high time to accept that malware will get inside your network one way or another, and do some heavy lifting to shore up your defenses.

Watch our recorded webinar and learn:

  • How to implement a least-privilege model and make sure it works, so you can minimize the damage malware can do
  • How to spot possible ransomware activity so you can quickly shut it down
  • How to prepare smart  traps to catch ransomware before it’s too late
  • And more!
Hosted by
Adam Stetson,
Systems Engineer

Hiding in Plain Sight: How Attackers Move through the Network Undetected

Once attackers have breached the perimeter, they often lurk in the network for months, looking for valuable data to steal. To stay hidden, they try to make their actions blend in with normal traffic.

By the end of this session, you will know:

·         What techniques attackers use to traverse the network without raising alarms

·         What native Microsoft tools can help you spot covert attacks

·         How you can identify the hiding attacks by using Netwrix Auditor functionality

24
April
2pm EDT
24 April, 2pm EDT
Register Now