Tech Briefs: Worried About Being The Next Ransomware Victim?
Thursday, June 10th from 11:00 am - 12:30 pm PT
The content of our upcoming June 10th event is crucially relevant to what is going on in today’s marketplace regarding Ransomware. A major local healthcare organization was recently a victim to malware targeting their information systems. Colonial Pipeline paid $4.4 million in ransom to hackers. The stoppage spurred gasoline prices to surge to the highest levels in more than 6 ½ years.
Organizations are not just affected financially. You also risk losing trust in your brand and reputation, suffering loss of sensitive data for both you and your clients, potential failure of your organization, and loss of livelihood.
Ransomware is top of mind. It’s not a matter of IF but WHEN your organization will be hit. Join us in our upcoming event to hear how to protect your organization.
We are proud to feature Nth’s very own Jeromie Jackson, Director of Security & Analytics, who will lead the event in a detailed introduction, followed by 8-minute technology briefs from four leading technologies. Learn about:
Covering your 3 P's: Policies, Procedures, Protective Technologies.
End-to-end protection utilizing Artificial Intelligence at the network, endpoint, and data layers.
How to emulate a ransomware attack from the beginning to end and determine your Ransomware Readiness.
How encryption, multifactor authentication, and segregated backups can truly help combat tampering with priceless backups.
Emulation versus Simulation. Hear how Nth Generation's Ransomware Readiness Assessment utilizes emulation that duplicates a chosen system (endpoint), points your security controls to the "duplicated" system, and tests your actual security protections. A simulation may only provide a good idea of your security readiness but will not test an actual replica with all your applicable security countermeasures at play.
Featuring Special Guest: Atakama - File Encryption Software
Dimitri Nemirovsky, Co-Founder and COO, If your company isn't encrypting files, you are making a big mistake. Atakama's data encryption software makes encrypting at the file-level simple. In this Tech Brief, Dimitri will cover how Atakama provides efficient, straightforward data encryption in a streamlined process.
And Subject Matter Experts: Nth Generation: Your Trusted Information Technology and Security Advisor
Jeromie Jackson, Director of Security & Analytics. Hear about Nth Generation’s spectrum of technologies, services and assessments to assist in keeping your organization safe.
Darktrace: Detection & Response
Justin Fier, Director of Cyber Intelligence and Analytics. Learn about the Darktrace Immune System, the world’s leading autonomous cyber defense platform. Protect your workforce by detecting, investigating, and responding to cyber-threats in real time.
Varonis: Data Security & Analytics
Kilian Englert, Technical Marketing Manager. Hear how Varonis protects enterprise data on premises and in the cloud: sensitive files and emails; confidential customer, patient and employee data; financial records; strategic and product plans; and other intellectual property.
iland Cloud: Secure & Compliant Hosting: IaaS, DRaaS, BaaS
Will Urban, Senior Marketing Technologist. Review how iland’s Backup as a Service (BaaS), Disaster Recovery as a Service (DRaaS), and Infrastructure as a Service (Iaas) has helped victims of ransomware get back online very quickly, saving them pain and money.