| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Your client calls in the middle of the night in a full-fledged panic. They have been hacked. You rush over and arrive on the scene to find something that sends chills down your spine: ransomware. Your client desperately wants their data back, and you are their only hope. What do you do?
This presentation will guide you through the first 48 hours of a ransomware case.
Using case studies, presenters will show you how to assess the scene, triage and quarantine infected devices, identify likely suspects, eradicate the malware threat, bring data home to its rightful owner, and restore order. Attendees will learn the pros and cons of paying for hostage data, making Bitcoin ransom payments, and tracing Bitcoin transactions on the blockchain. By the end of this presentation, attendees will never let their case go cold.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast