Recovering from a Destructive Cyber Attack
Threat actors continue to develop better, more advanced tactics to encrypt your organization’s data for ransom, destroying backups along the way to ensure their payday. There are many tools, capabilities and techniques to build resilience to counter these threats, but there are few standards to help. How do you know what to do and whether it will actually protect you?
Please join Jim Clancy—SVP, Global Data Protection Sales and Jim Shook—Director of the Cybersecurity and Compliance Practice, as they discuss the threat landscape, data vaults, content analytics and “immutability”; how these capabilities may not deliver what you expect; and how you can design a strategy to protect against the full array of destructive threat actors.
You will learn more about:
- The nature and types of cybercrime and cyber actors
- The regulatory environment and best practice guidance
- Secure data vaults and the operation of the Dell Cyber Recovery Solution
- The role and importance of analytics
Relevant Government Agencies
Air Force, Army, Navy & Marine Corps, Intelligence Agencies, DOD & Military, Other Federal Agencies
Event Type
On-Demand Webcast
This event has no exhibitor/sponsor opportunities
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Event Sponsors
Organizer
AFCEA International | Signal Media