See how ransomware can be purchased and deployed to cause disruption at scale.
Experience a comprehensive walkthrough of a ransomware attack, from purchase to deployment and its widespread impacts. This session combines elements of phishing, the dark web, and monetization tactics to demonstrate the ease and destructiveness of ransomware.
Anatomy of a ransomware attack.
Tactics for deploying ransomware.
Countermeasures to protect against attacks.
Outline recent developments in ransomware, including attacks on mobile devices.
Simulate a ransomware attack to illustrate its impact on data and network infiltration risks.
Discuss the balance between human vigilance and software solutions in mitigating ransomware threats.
Identify and apply effective countermeasures against ransomware.
Want to find out more? Got a question you can’t find an answer for? Know your teams
need some training but not sure where to start? Leave us your details and we’ll get back to
you 🙂