From Enterprise Admin credentials being leaked to a limited access breach, we will go into detail on four different Ransomware attacks. We look at the attackers approach, the DR solutions in place, and what was ultimately required for a complete recovery. This session is a great opportunity to learn from others' mistakes, and ensure you're taking the right steps to protect your important data.
You will learn:
- Why traditional DR does not protect against Ransomware
- What procedures need to be in place when an attack occurs
- Step-by-Step remediation guide