Making Ransomware Irrelevant
Abstract
As the number of people working remotely grows, so do security risks. Cyber attacks surged during the pandemic and continue to threaten more businesses, no matter their size.
For many organizations, taking the right steps to ensure the protection of data and assets seems to be a moving target. But there are actions you can take to prevent zero day vulnerabilities from growing into mass compromise ransom events.
The ‘New Normal’ is far more Tech-Driven which is presenting more and bigger challenges:
- More remote working and remote access
- Increased reliance on the cloud—for everything from business operations to shopping
- Rising threat activity and more sophisticated threat actors
- Business and financial risk at an all-time high
The new normal demands that we have strong, trusted defenses and we confront threats with resilience, agility, and innovation. We must anticipate, validate, and assure our security. And we must choose tech partners who have the mindset and don’t give up, never lay down their guard, and always strive for better.
Join us as we discuss the cybercrime impacts on businesses targeted with ransomware and some of the long reaching effects. We will also examine an ‘assume-breach mindset’ and why it’s critical to adopt in the age of rampant attacks and as with all ransomware activity, there are basic steps an organization can take to protect itself before and after such an event.
The cloud leaders from MR2 Solutions, RapidScale, and Trust Wave will discuss the current threats both from domestic and international threats and provide insights on how to change our approach to these threats.
Sponsors
Anthony Williams
VP of Technology Strategic Solutions/CIO
MR2Solutions
Anthony Williams is the Vice President of Technology Strategic Solutions/Chief Information Officer for MR2 Solutions.
In his role, Anthony leads the MR2 organization as a fractional/virtual Chief Information Officer in an Information Technology, Analytics, and Security role. He is accountable as a dedicated resource which serves as a Chief Information Officer (CIO) on a flexible basis. His primary function is to formulate strategic IT goals for MR2 customers and then manage an IT strategy and budget that meets those goals.
Anthony is a veteran technology executive with extensive expertise in all strategic aspects of the Information Technology function with demonstrated ability to apply technology to transform business operations, lower costs, and accelerate global alignment while building a collaborative and high-performance culture.
Anthony holds a Bachelor of Science in Information Technology (BSIT), a Master of Business Administration (MBA), and is completing his Doctor of Philosophy in Information Technology. Anthony is also a member of ISACA, Orange County Chapter.
Anthony lives in Irvine, CA, with his fiancé. In his free time, Anthony enjoys traveling, music and attending sporting events.
Steven Baer
Field CTO – Americas, Trustwave (CSU)
Steven (known as just ‘Baer’ to most) has been in the InfoSec industry for over 20 years starting out in banking and e-commerce then moving on to specialized technologies at RSA, Trustwave, and Dell-SecureWorks. Baer was most recently Director of Security Architects – Americas for Dell-SecureWorks where he directly managed 82 Security Architects (presales engineers) across all sales market segments.
Prior to that Baer was VP, Global Director of Systems Engineers at Trustwave. In that role he directly managed over 45 sales engineers in a global sales capacity. He was responsible for key sales engineer talent acquisition, retention, hiring, on-boarding and training sales engineers to support all technical aspects of the sale.
Baer has spent over 8 years running IT-Risk at JP Morgan Chase and has also played pivotal leadership roles as a virtual CISO and executive sponsor. Baer is an active participant in Infragard, The Chicago FBI Citizen’s Academy and on the Steering Committee for the U.S. Secret Service Chicago Electronic Crimes Task Force.
Baer has spearheaded Trustwave Government Solutions Cybersecurity Maturity Model Certification – Registered Provider Organization, as well as obtained a Registered Practitioner Certification.
Robby Gulri
Solutions Engineer, RapidScale
Robby brings over 30 years of technology product marketing, product management, and solutions engineering experience. He has introduced 11 Cloud / SaaS / Cybersecurity products and solutions to market in the areas of predictive analytics, machine learning software, information security, mobile device security, and email encryption. Robby recently joined the RapidScale solutions engineering leadership team out of the Atlanta office.
Jason Belajack
Senior Technology Advisor, MR2Solutions
Born in San Diego, raised in Palm Springs and thriving in Newport Beach. Jason has been a Trusted Advisor in the mid to enterprise space for 10+ years. His role is to help clients navigate the confusion in the market caused by the accelerating pace of change in IT. His key responsibility is to know the strengths of key service providers in order to agnostically help clients select which options are in their best interest. Quite simply, his role is to work side by side with your team to design, procure, implement, and support event the most complex IT solutions.
Agenda
January 11: Virtual Event
Time Details: 5pm – 6:15pm
Webinar Rates
ISACA Members | Non-Members | Full-Time Students & Faculty |
|
Rate |
$0 | $10 | $0 |
*Virtual education events (e.g. Webinars) CPEs
Qualifications for one CPE require attendees to be online for at least 50 minutes and answer at least 3 posted polling questions.
Polling participations are recorded and reviewed for CPE qualifications.
CPE certificates are emailed to attendees within a week of the completion of the live webinar.
If recorded webinars are viewed, CPEs should be self-reported. The chapter only provides formal CPEs for attendance of live virtual events.
*Disclaimer
ISACA reserves the right to alter or delete items from the program in the event of unforeseen circumstances. Material has been prepared for the professional development of ISACA members and others in the IT audit, control, security, and governance community. Neither the presenters nor ISACA can warrant that the use of material presented will be adequate to discharge the legal or professional liability of the members in the conduct of their practices. All materials used in the preparation and delivery of presentations on behalf of ISACA are original materials created by the speakers, or otherwise are materials which the speakers have all rights and authority to use and/or reproduce in connection with such presentation. Subject to the rights granted in all applicable copyrights, trade secrets, and other intellectual property rights in the materials are and remain with the speakers.
*Please note: unauthorized recording, in any form, of presentations and workshops is prohibited.