exclusive online course
Don’t Pay the Ransom
A ransomware attack strikes every 11 seconds.
Despite thick firewalls, the bad guys will get through. Some businesses pay the ransom but most want to recover, so they don’t let the bad guys win. A payout isn’t the only way out.
Sign up for our newsletter to be notified when this course goes live:
If hackers exploit your backups, you pay the ransom. If your backups survive, you need to know what to recover and how long it will take. If you don’t, you pay the ransom. But even with a decryption key, recovery takes days or weeks and the hackers may not return all the data.
Recovery from a clean backup is the only way to beat hackers.
We’ll discuss how to:
- Analyze backup metadata for unusual behavior;
- Quickly identify what data was encrypted and where it lives;
- Locate PII that may have been exposed to a data exfiltration attack;
- Automatically protect new workloads and lock retention to prohibit deletion of backup data.
Watch our bonus content for a taste of what the coursework will be like.
Your CyberEd Instructor
Technical Sales Director, Rubrik
As technical sales director, Cook is responsible for major accounts at Rubrik. He has been with the company for over four years and has experience in consulting, sales, project management and information technology.