Event Recording

Ransomware – True Consequences to Business

Speaker
Frank Kölmel
RVP Central Europe
cybereason
Frank Kölmel
Frank Kölmel brings over 25 years of industry expertise and was most recently with Palo Alto Networks. Previously, Frank Kölmel led FireEye's business in Central and Eastern Europe to become the most successful region in EMEA. In this context, Frank Kölmel launched FireEye's...
View profile
Top related content
Event Recording
The Role of Identity & Access Management for Ransomware Resilience
May 11, 2022
Webinar Recording
Lessons From a Journey Into a Real-World Ransomware Attack
Dec 08, 2021

Ransomware Attacks have become the biggest single cyber risk for enterprises of any size and industry. Research indicates a steep rise not only in the number of attacks, but as well in the average damage per incident. It is therefore essential that organizations are prepared for these attacks.

Event Recording
Cyber Council Panel | Cybersecurity Trends 2022
Nov 10, 2021
Event Recording
Ransomware: What Happens When the Tech Stops?
Nov 11, 2021
Event Recording
Fighting the Ransomware Storm
Nov 11, 2021
Webinar Recording
Breaking the Ransomware Attack Chain
Oct 05, 2022

At some point, any business connected to the internet is likely to become a victim of a ransomware because they are relatively easy and inexpensive to carry out, but potentially yield large payouts for cybercriminals. The best way of tackling this threat is to know how to break the attack chain. Join security experts from KuppingerCole Analysts and BeyondTrust to find out why digital transformation has massively increased the attack surface, what you need to know about ransomware, why it appears to be winning, and how to create effective defenses against it. 

John Tolbert, Lead Analyst at KuppingerCole is joined by Brian Chappell, Chief Security Strategist at BeyondTrust to discuss what security practices can realistically be implemented to defend against ransomware, which has become one of the most common cyber threats facing most organizations, particularly those in the energy, shipping, wholesale, retail, healthcare and financial industry sectors. These experts and security industry veterans will also discuss the role that Privileged Access Management (PAM) can play in mitigating the risks of ransomware and other cyber threats by reducing the opportunities for attackers to access and navigate targeted IT environments.

Event Recording
Hacked! 72 Hours of a CISO's Nightmare
Nov 14, 2023

When the worst happens, and your defenses are breached, how do you respond? This engaging workshop, led by an experienced CISO, takes you through the crucial first hours of a cyber-attack. Using real-world examples and first-hand experience, the workshop highlights the immediate steps and strategies essential to mitigating damage and restoring operations. It provides insight into the tactical responses required during these stressful moments and offers guidance on how to create a robust response plan to prepare your organization better.

Attendees can expect to walk away with a better understanding of incident response management and benefit from the lessons learned from past attacks. This is a rare opportunity to learn from the trenches and equip your organization with the resilience it needs in the face of cybersecurity threats.

Webinar Recording
Surviving the Cyber Security Attack Wave
Oct 14, 2011

KuppingerCole Webinar recording

Event Recording
From Encryption to Extortion: The New Face of Ransomware Attacks
Nov 15, 2023

The surge in ransomware attacks has become one of our most pressing cybersecurity challenges. With attackers continuously adapting and refining their tactics, staying abreast of the latest developments and trends in this ever-evolving threat landscape is crucial.

Florian and Stefan explore the modern nuances of ransomware attacks in this panel. Discussions will revolve around cutting-edge techniques such as double extortion, where attackers deny access to data and threaten its public release, and the shift towards targeting operational technology, leading to real-world disruptions. Moreover, the panel will highlight the rise of decentralized ransomware models that utilize networks of affiliates and delve into the contentious debate around the ethics and implications of paying ransomware.

Beyond understanding the current ransomware landscape, attendees will be introduced to preventive measures, effective response strategies, and potential future trajectories of ransomware evolution. Join this insightful discussion to equip yourself with the tools and knowledge needed to navigate the complexities of ransomware in today's interconnected digital ecosystem.