Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)

The Current State of Ransomware

On-Demand

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
On-Demand

Known as gangs, extortion groups or simply attackers, the likes of Lapsu$ Conti, Maze and others continue to make headlines with high profile attacks and staggering demands. Attacker innovation requires organizations to revisit programs focused on proactive protection.

Security researchers at CyberArk Labs continue to analyze variants and determine the best mitigation strategy. We know the common points of entry, tactics and tools the attackers use, and we'll brief you on the details.

Fundamentally understanding ransomware attacker “innovation” will enable you to make security prioritization decisions that strengthen defense. CyberArk’s Allan Cox, SE manager & solutions architect covers the best practices and strategies to combat ransomware.

Andy Thompson of CyberArk Labs provides a current view of:

  • Who ransomware operators are
  • What industries they target
  • New variants discovered by CyberArk Labs

Watch on-demand to learn about current tactics and proven best practices and steps your organization can follow to prevent ransomware.


Speakers

Andy Thompson, Research Evangelist, CyberArk
Allan Cox, SE Manager & Solutions Architect, CyberArk


WATCH NOW

Adjust the vertical spacer by editing the class "spacer-X" where X = 0 (none) thru 5 (most)
ABOUT CYBERARK

CyberArk is the global leader in Identity Security. Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity – human or machine – across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world’s leading organizations trust CyberArk to help secure their most critical assets.