For the best web experience, please use IE11+, Chrome, Firefox, or Safari

Deconstructing a ransomware attack: A case study

Deconstructing a ransomware attack: A case study
On Demand
  • Recorded Date:Nov. 2, 2021
  • Event:On Demand
Deconstructing a ransomware attack: A case study

Virtually every headline-generating breach is the result of misuse or abuse of privileged credentials. Proper PAM practices would have gone a long way towards preventing, speeding recovery, and minimizing damages from these incidents. In this session, we'll discuss a recent ransomware attack, looking at what went wrong and what could have been done to mitigate or even prevent the damage.

Watch Your Free Webcast

Please wait...

triangle-down check
By downloading, you are registering to receive marketing email from us. To opt-out, follow steps described in our Privacy Policy.

reCAPTCHA protects this site. See Google's Privacy Policy and Terms of Use.