The Impact of Ransomware & How to Defend Against It

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

Ransomware attacks have been an ongoing concern since they first emerged as a threat in the mid-2000s and this method of extortion has continued to wreak havoc on individuals and businesses alike across the globe. 

Last year saw a prolific increase in the number of new ransomware families and 2016 was dubbed ‘the year of ransomware’. All of these new families are armed with capabilities to encrypt various file types mobile devices and servers as well as computers. 

One of the most notable examples was the huge WannaCry attack that recently crippled various public health services in the UK and other organizations worldwide. WannaCry is evidence that this threat does not appear to be slowing down, making it even more important to be sufficiently protected.

Join this webinar to find out more on the history and evolution of ransomware as well as how the recent WannaCry outbreak developed and the impact it had globally along with:

  • How and why threat actors utilize ransomware
  • What you can do to minimize the risk and mitigate against it

Speakers

Photo of Jon Clay

Jon Clay

Director Global Threat Communications, Trend Micro

Photo of Michael Hill

Michael Hill

Former Editor, Infosecurity Magazine

Photo of Matt White

Matt White

Freelance Senior Information Security Consultant

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see the privacy policy for Trend Micro here: https://www.trendmicro.com/en_gb/about/trust-center/privacy.html. Please see Infosecurity Magazine’s privacy policy for more information.