Cyber recovery: Surviving a digital extinction-level event

Published on: Dec 04, 2019

Cyber criminals are increasingly attacking operational systems and backup capabilities simultaneously in highly sophisticated ways. What are some of the advanced tactics being used, and how have organizations effectively addressed the aftermath?

We'll discuss:

  • At a high level, important technical underpinnings of recent attacks.
  • Potential destructive effects of such attacks, including locking companies out of their information technology globally, corrupting backups, and indefinitely disrupting businesses.
  • Lessons learned from recent attacks, including data destruction recovery techniques that have helped affected companies bounce back.

Participants will examine tactics used in recent cyberattacks, analyze their disruptive effects, and identify techniques to recover their valuable data assets

Register/view archive


Multi screens Image

Related Topics

Correction list for hyphenation

These words serve as exceptions. Once entered, they are only hyphenated at the specified hyphenation points. Each word should be on a separate line.