Ransomware used to be more of a consumer or end-user problem. Now criminal groups have evolved their methods into a big business, infiltrating ransomware into networks and effectively repurposing those networks to monetize your data against you. They’ve grown so complex and varied that traditional IT system defenses such as antivirus (AV) software and intrusion prevention systems (IPSs) are not enough on their own. This web conference will delve into the nefarious and sophisticated evolution of ransomware, highlighting the details that could be key to keeping your organization safe.

In this session, attendees will learn:

• How to apply additional layered security and maintain specialized visibility into these attacks
• Three ways to reduce and manage operational risk in the face of this evolving cyberthreat

Generously Supported By:

supported by logo
speaker photo
Jeffrey Ingalsbe
CISO, Flexible Plan Investments, Ltd.
Responsible for the cybersecurity necessary to support business objectives which include: developing, implementing, and monitoring enterprise-wide initiatives to reduce information security risks, promoting utilization of industry standards and best practices, tracking of violations of privacy and security, identifying security trends and evolving technologies, reporting information security risks in a manner that meets compliance and regulatory requirements, and communicating effectively with executive committee about related information security issues and implications to the enterprise. Lead efforts to promote a cybersecurity culture through ongoing, hands-on, awareness activities. Research, publish, and speak on cybersecurity related issues in the financial services sector.
speaker photo
Josh Scott
Information Security Architect, City of Portland, Oregon
Josh Scott is an Information Security Architect with the City of Portland with over 20 years of experience in the IT Industry. Josh mostly works in Incident Response and other defensive roles, protecting networks and systems from the world’s evil-doers. He is a lover of Thai food, gluten free water, and organic Oreos.
speaker photo
Ed Cabrera
Chief Cybersecurity Officer, Trend Micro

Eduardo Cabrera is responsible for analyzing emerging cyber threats to develop innovative and resilient enterprise risk management strategies for Fortune 500 clients and strategic partners. Before joining Trend Micro, he was a 20-year veteran and former CISO of the United States Secret Service with experience leading information security, cyber investigative, and protective programs in support of the Secret Service integrated mission.

He started his career investigating transnational cyber criminal groups targeting the financial and retail sectors. He proudly served on the Presidential Protective Division for President George W. Bush before transitioning to lead cyber forensic operations in support of Secret Service large-scale data breach investigations. He served as the Secret Service Strategic Advisor to the DHS National Cybersecurity & Communications Integration Center (NCCIC), where he led an interagency effort to share real-time actionable threat intelligence with Information Sharing and Analysis Organizations (ISAO) and critical infrastructure partners.

Ed is a guest lecturer at New York University Polytechnic Institute, Computer Science and Engineering Department. He was a contributing subject matter expert on law enforcement, cybersecurity strategy and policy, and computer forensics and network intrusion incident response for these projects: 2014 Risk and Responsibility in a Hyperconnected World; 2012 Homeland Security Advisory Council Task Force on Cyber Skills Report; and 2012 Insider Threat Study: Illicit Cyber Activity Involving Fraud in the U.S. Financial Services Sector. He is a Certified Information Systems Security Professional (CISSP) and a Certified Information Systems Auditor (CISA).

speaker photo
Candy Alexander
Director, International Board ISSA
Ms. Alexander is an ISSA Hall of Fame recipient and thought leader in the information security profession with 25+ years experience performing many aspects of information security. She is the Chief Architect for the Cybersecurity Career Lifecycle (Tm) which is used to deliver services to ISSA members world-wide.