Tracking Ransomware: Using Behavior to Find New Threats | | "Every minute, nearly 5,000 data records are lost or stolen somewhere around the globe: that's more than 7.1 million a day." — DarkReading.com |
---|
Don't let your enterprise become a statistic. At INsecurity, learn how to combat new cybersecurity threats and challenges. Get practical advice and insight from top enterprise security professionals that you can use in your own security practice. | | | Advisory Board Announced The INsecurity Advisory Board brings together some of the cybersecurity industry's best leaders, practitioners, and thinkers to offer counsel on the key challenges faced by professionals defending their organizations from today's threats. Advisory Board members collaborate with our editors and recommend speakers, session topics, and event features. Meet the Board: | President, Cyxtera Federal Group; Former CISO, US Federal Government | | Founding Partner, Urbane Security | | Technical Product Security Leader, Digital Technology, Baker Hughes, a GE Company | | Executive Director, Optiv |
| | | Tracking Ransomware: Using Behavior to Find New Threats Jessica Bair | Senior Manager, Cisco Systems, Inc. This session will explore traits of highly effective strains of self-propagating malware, as well as advances in tools to facilitate lateral movement. |
| | Come as a Team & Save Big |
Explore new strategies and solutions as a team and quickly transform ideas into action. Motivate and expand the expertise of your team collectively. Learn more about our group pricing. |
| | Before INsecurity begins, kick-off your conference experience with Black Hat Trainings. These 2-day Trainings fill up fast, so register early to lock in the lowest rate possible and guarantee your seat in the class of your choice. |
| | #INsecurityCon Dark Reading INsecurity c/o UBM 303 Second St., Suite 900 South Tower San Francisco, CA 94107 INsecurity.com |
|
| |
|