This site uses cookies to provide you with a more responsive and personalised service. By using this site you agree to our use of cookies. Please read our cookie notice (http://www2.deloitte.com/ca/en/legal/cookies.html) for more information on the cookies we use and how to delete or block them.
The full functionality of our site is not supported on your browser version, or you may have 'compatibility mode' selected. Please turn off compatibility mode, upgrade your browser to at least Internet Explorer 9, or try using another browser such as Google Chrome or Mozilla Firefox.

Cyber recovery: Surviving a digital extinction-level event

Published on: Dec 04, 2019

Cyber criminals are increasingly attacking operational systems and backup capabilities simultaneously in highly sophisticated ways. What are some of the advanced tactics being used, and how have organizations effectively addressed the aftermath?

We'll discuss:

  • At a high level, important technical underpinnings of recent attacks.
  • Potential destructive effects of such attacks, including locking companies out of their information technology globally, corrupting backups, and indefinitely disrupting businesses.
  • Lessons learned from recent attacks, including data destruction recovery techniques that have helped affected companies bounce back.

Participants will examine tactics used in recent cyberattacks, analyze their disruptive effects, and identify techniques to recover their valuable data assets

Register/view archive

 

Multi screens Image

Related Topics

Correction list for hyphenation

These words serve as exceptions. Once entered, they are only hyphenated at the specified hyphenation points. Each word should be on a separate line.