mlns='http://www.w3.org/1999/xhtml'>

Expert cyber threat analysts discuss best practices and methodologies
InformationWeek Webinar
 
Tuesday, March 16, 2021 | 10AM PT / 1PM ET
Ransomware operators have begun to shift their malicious behavior before encrypting files. This tactic has made it more difficult for an organization to distinguish from legitimate user activity through the use of applications already installed on network systems ("living-of-the-land" techniques), off-the-shelf red team tools, and Windows utilities.

Recorded Future's team of expert cyber threat analysts researched malicious actors with a specific focus on "big game" ransomware operators. Attend this webinar to find out what they discovered.

In this webinar you'll get:
  • Best practices and methodologies that organizations can use to detect threats
  • Specific examples of actual compromises by ransomware operators, analyzing their techniques, procedures and tool usage to derive detections
  • Guidance on how to identify opportunities for detecting malicious behavior during the post-compromise, pre-encryption phase
Amazon gift card first 25 attendees
Can’t attend the webinar? Register anyway, and we’ll let you know when it is available on-demand.
Recorded Future
 
speaker
speaker
Director of Operational Outcomes for Insikt Group
Recorded Future
Contributing Editor
InformationWeek
Having Register through this promotion and attend the live webinar on March 16, 2021 for your chance to receive a $10 Amazon.com gift card. Valid for the first 25 live attendees in the U.S and Canada. This offer is not sponsored, endorsed or administered by Amazon.com®.
Having trouble viewing this email? View Web Version