Main Navigation Section

Lessons Learned in Recovering from a Ransomware Attack

Detalhes do evento

Sob demanda
  • Data gravada:Nov. 10, 2021

If ransomware strikes your business tomorrow, are you prepared?

In its recent Annual Cyber Threat report, the Australian Cyber Security Centre (ACSC) highlighted that while there has been a decrease in reported cyber attacks in     FY20-21, the severity of attacks is increasing, with nearly half of the reported cyber security incidents categorised as “substantial in impact”.

The string of recent ransomware attacks on major global organisations have been a wakeup call to many businesses to review the current state of their cyber resilience plans. Executive and Risk Committees are putting greater focus on their organisation's ability to recover from an attack within acceptable timeframes. During a recent cyber resilience review, an Australian Government authority identified that they could not recover Active Directory in under 7 days. Despite being categorised as low probability, this was deemed an unacceptable risk because of its high impact — loss of revenue, fines and reputational damage. This has led to the authority seeking solutions to reduce their risk.

If Active Directory (AD) isn’t at the centre of your cyber resilience plans, you may have to rebuild everything from the ground up after an attack. Even then, you may never gain access to your data again.

In this on-demand webcast Quest experts Brian Hymer & Bryan Patton share their learnings from working with large global customers in recovering Active Directory following cyber attacks.

Speakers

  • Brian Hymer, Solutions Architect, Quest
  • Bryan Patton (CISSP), Principal Strategic Systems Consultant, Quest

Detalhes do evento

Sob demanda
  • Data gravada:Nov. 10, 2021

Watch Your Free Webcast

group2

Ao fazer o download, você se inscreverá para receber nosso e-mail marketing. Para cancelar sua inscrição, siga as etapas descritas em nossa Política de Privacidade.

reCAPTCHA protege este site. Confira a Política de Privacidade e os Termos de Uso do Google.

Compartilhe