WEBINAR

True Cost of Ransomware: Leverage Peer Insights to Defend Against Attacks

ON DEMAND

In recent years, Ransomware has become more frequent, more sophisticated and more effective. As organizations continue to bolster their defense against these attacks, the question remains - does it pay to pay?

Register for this webinar session to hear the answer to this question and gain access to Cybereason's third annual Ransomware: The True Cost to Business report. Not only do we investigate the tangible cost impact of ransomware; we’ll also cover guidance for defending against such attacks. Don’t miss out on this invaluable opportunity to learn from others in the industry and use these insights to improve your Ransomware planning.

Watch Now

About the Webinar

In this webinar, Cybereason’s VP & Global Field CISO, Greg Day joins forces with Matt Caylor, Cybereason’s Senior Director of Service Operations & Threat Intelligence, to dig into the data from the report, to explain how to quantify the true cost to business of ransomware attacks and what cybersecurity leaders can do to mitigate against them.

Meet the Speakers

Greg-Day-circle-hs

GREG DAY

VP & Global Field CISO, Cybereason

Prior to joining Cybereason, Greg held CSO and CTO positions with Palo Alto Networks, FireEye and Symantec. A respected thought leader and long-time advocate for stronger, more proactive cybersecurity, Greg has helped many law enforcement agencies improve detection of cybercriminal behavior. In addition, he previously taught malware forensics to agencies around the world and has worked in advisory capacities for the Council of Europe on cybercrime and the UK National Crime Agency. He currently serves on the Europol cyber security industry advisory board.

Matt-Caylor-circle-hs

MATT CAYLOR

Senior Director of Service Operations & Threat Intelligence, Cybereason

Matt Caylor is the Senior Director for Service Operations & Threat Intelligence at Cybereason. A former Cyber Warfare Engineer for the U.S. Navy, Matt has an extensive background in offensive and defensive cyberspace operations, software development, and intelligence production.