Cybersecurity consultant Art Taryan will explain why ransomware attacks work and how to thwart them. You will learn what steps you need to take today to protect your organization and prepare to respond.
Topics covered
- What is ransomware? How does it function?
- What is the typical threat actor attack chain?
- What is the current ransomware threat landscape?
- How can organizations prepare for ransomware?
- How should you respond to ransomware?
- How can your organization recover from an attack?
- What are the best practices from private industry?
- What steps does the federal government recommend you take?
Training Overview
Would you pay a ransom? Plan your cyberattack response today.
Ransomware attacks are no longer rare or random—they are frequent, carefully planned, and highly targeted. Your organization could easily be the next Colonial Pipeline or JBS Foods.
You need to decide today how you would respond. After taking the critical steps necessary to protect your organization, you must determine what to do when defenses fail. By understanding how these attacks work, the goals of the hackers behind them, and your options, you can more calmly respond fueled by planning and logic instead of urgency and emotion.
The immediate steps you take can reduce losses, help investigators, protect your stakeholders, and preserve your reputation.
- What is ransomware? How does it function?
- What is the typical threat actor attack chain?
- What is the current ransomware threat landscape?
- How can organizations prepare for ransomware?
- How should you respond to ransomware?
- How can your organization recover from an attack?
- What are the best practices from private industry?
- What steps does the federal government recommend you take?
Who Should Attend?
|
|
Expert Presenter


Art Taryan
- 14 years of experience in risk/threat and project management within multiple Fortune 500 companies and the US military
- Focuses on cyber threat intelligence, threat modeling, insider threat, incident response, and counter fraud
- Leads the threat intelligence efforts within Cross Country Consulting’s Cyber & Privacy group
- Previously an Army officer, including supporting real-world defensive and offensive cyber operations alongside the NSA