End Ransomware

Attack Simulation

Hunter Series

ON-DEMAND

Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response. 

Join this session to learn more about how mature security teams can more effectively manage a modern ransomware operation and avoid a system-wide takeover by bad actors - delivered through a step-by-step walkthrough of an attack.


Attending these sessions / this session live qualifies you for a Continuing Professional Education (CPE) credit, a requirement to maintain CISSP certification. To receive credit, attend the full live session to receive your confirmation email of attendance. 

*Can't make this date? That's ok, register anyway and we'll send you the on-demand recording following the event.

ABOUT THE THREAT HUNTER ATTACK SIMULATION

This is a threat intelligence-driven event where we're going to be emulating an adversary and showing you some approaches to think about/consider when protecting against that adversary.

Beating modern ransomware attacks means not only preventing the ransomware payload from running, but also finding and addressing the malicious behaviors that come before it. Our Nocturnus team proactively researches and reverse-engineers new strains of ransomware - see our latest findings in action and why Cybereason arms you with fearless protection against ransomware to reduce risk across your enterprise. Cybereason allows defenders to detect earlier and remediate faster with one lightweight agent and an array of deployment options. 

Join us for this in-depth hunter attack simulation to learn:

  • Why ransomware continues to evolve & common delivery methods
  • The differences and similarities between ransomware and other forms of malware
  • Common methods attackers use to escalate their operations
  • Reliable techniques Defenders can use to end active ransomware operators in their environments

Cybereason vs.  (1)

Meet The Speakers

israel-hs-circle

ISRAEL BARAK

CHIEF INFORMATION SECURITY OFFICER, CYBEREASON

Israel Barak, CISO, is a cyber defense and warfare expert, with extensive background working for the government where he established and operated various cyber warfare teams. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, as well as research and analysis of current and evolving advanced threats.

tim-amey-hs-circle

Tim Amey

North America Field Chief Technology Officer

Tim Amey is a senior technologist with over 20 years of experience helping customers throughout North America solve complex security challenges in highly innovative ways. Serving as the Field CTO for North America, Tim joined Cybereason nearly 6 years ago. He is a trusted technical adviser for many of the world's top security teams. Prior to Cybereason, he worked with industry-leading technology companies such as TippingPoint, Q1 Labs / IBM, F5, and Bromium.

jj-circle-headshot

JJ Cranford

PRODUCT MANAGER, CYBEREASON

JJ Cranford is part of Cybereason's Product team primarily responsible for the go-to market strategy of the Cybereason platform of products for endpoint protection, detection and response. Prior to joining Cybereason, JJ spent nearly a decade at Guidance Software (later OpenText by acquisition), where he was responsible for the EnCase suite of products for endpoint security, DFIR and forensic investigations. JJ provides insight and expertise into market trends, industry challenges and solutions in the areas of ransomware protection, incident response, endpoint security, and risk management.