Ransomware: one of the most feared nouns by any person playing a role in IT. It’s a difficult evil to eradicate, but not everyone is aware that it’s just the final act of a series of other attacks, movements, operations done in the shadows. In this Workshop we will tell you about the most common methods of infection, the techniques that are used to wipe out data protection systems (did you know that whoever carries out a ransomware attack first of all deletes the backups present?), the new techniques of data protection of a backup and the Zero Trust approach to the world of data protection. Don’t know what the Zero Trust concept is? This workshop is for you! Interested in security? This workshop is for you! Do you want to sleep better and have a responsible role? This workshop is for you! In fact, whoever you are, this workshop is for you.
Program
- Basic security notions
- The attack process
- The supply chain attack
- False myths or questions
- Ransomware chronicles
- ransomware attack:Hands on labs
- Exploitation
- Prevention with Commvault + Azure blob storage with blob-level immutability
- Prevention with Veeam + Wasabi cloud storage with object-level immutability Lessons learned