Cyber Ransomware Attack: What Happens Next
Notice: See below for CPE Policy.
It’s no longer a matter of if, but when a ransom attack against critical systems will occur. Many organizations are not fully prepared and lack an understanding of what happens next. This session will walk through a real-life ransomware attack scenario and discuss how internal audit can learn from these events when they occur. Key controls to implement to reduce post-event pain will also be discussed.
Learning Objectives
1. Learn from a breakdown of a real-life ransom attack.
2. Understand the key challenges facing organizations when a ransom attack occurs.
3. Learn about post-event actions and challenges that will help define controls and processes to be considered to reduce the post-event pain.
Event Sponsored By
About Our Speaker
Scott Madenburg
Director, GRC Solutions Advisor, AuditBoard
Scott Madenburg is the Director of Solutions Advisory Services at AuditBoard where he works with various internal audit and compliance teams to help automate the administrative tasks of audit, risk and compliance activities. Scott is an internal audit leader with over 15 years of global business experience in financial, information system, operational, and compliance auditing; Sarbanes-Oxley (SOX); business process evaluation and design; ERP system implementation and administration; mergers and acquisitions; cyber-security; and fraud investigation. Scott began his career at Arthur Andersen before transitioning into Internal Audit with Fox Entertainment & News Corporation and Gemstar-TV Guide/Rovi Corporation. Prior to joining AuditBoard, Scott was the Head of Audit at Mobilitie LLC, where he built the internal audit function from the ground up to an eight-person department focusing on agile audits, cyber and IT security, and FCC compliance.
Agenda
5:00 PM – 6:15 PM: Webinar Session
Time Details: 1 CPE Credit for the webinar
Webinar Rates
ISACA, IIA, ISSA,
ACFE, OWASP |
Non-Members | Full-Time Students & Faculty |
|
Rate |
$0 | $0 | $0 |
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
*Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.
*Permission to be Photographed, Videotaped, and Recorded
By attending this event, the registrant grants permission to be photographed, videotaped, and recorded during the event (in person or virtual). The resultant photographs, video recordings and virtual event recordings may be used by ISACA for future promotion of ISACA’s educational events on ISACA’s web site, on social media and/or in printed promotional materials, and by attending this event, the registrant consents to any such use. The registrant understands any use of the photographs, video recordings and virtual event recordings will be without remuneration. The registrant also waives any right to inspect or approve the aforementioned use of any photographs, video recordings and virtual event recordings now or in the future.