Ransomware deployed against the government and the public sector is instantly weaponized. It does not require any form of reconnaissance, any form of lateral movement, or privilege escalation; it blows up on impact, and the damage is done. The most dangerous ransomware enters your environment through server workloads, which must be defended differently than endpoints. And when server workloads are attacked by ransomware, any form of unintended execution can bring the entire system down. | |
- Defend server workloads differently than endpoints
- Protect the full application stack at the memory, host, and web layers
- Understand evolving attack tactics
- Deploy three tiers of defense: web defense capabilities, compiled code defense capabilities, and host defense capabilities
Do you have a schedule conflict?
Sign up to get a copy of the slides and access to the on-demand presentation after the webinar.
We are pleased to offer continuing professional education (CPE) credits to those that attend the event. For more information on the CPE credits we are offering, our CPE sponsor (NASBA), and the submission process, please click here.