Demystifying the Colonial Pipeline Attack & How Ransomware Works

The recent Darkside ransomware attack on Colonial Pipeline is just the latest in a spike of ransomware attacks on organizations with significant financial resources. During this presentation, we’ll overview the attack, the implications of this type of attack and what should you do now, if you haven’t taken action already.

You’ll learn:

  • How the attack happened and who was responsible?
  • Who is Darkside and what cybersecurity professionals should understand about them
  • Security practices you should put in place to counter ransomware
  • Actionable recommendations to prevent future ransomware incidents

View Resource

Speakers

Demystifying the Colonial Pipeline Attack & How Ransomware Works

Demystifying the Colonial Pipeline Attack & How Ransomware Works

The recent Darkside ransomware attack on Colonial Pipeline is just the latest in a spike of ransomware attacks on organizations with significant financial resources. During this presentation, we’ll overview the attack, the implications of this type of attack and what should you do now, if you haven’t taken action already.

You’ll learn:

  • How the attack happened and who was responsible?
  • Who is Darkside and what cybersecurity professionals should understand about them
  • Security practices you should put in place to counter ransomware
  • Actionable recommendations to prevent future ransomware incidents

Speakers

Demystifying the Colonial Pipeline Attack & How Ransomware Works

The recent Darkside ransomware attack on Colonial Pipeline is just the latest in a spike of ransomware attacks on organizations with significant financial resources. During this presentation, we’ll overview the attack, the implications of this type of attack and what should you do now, if you haven’t taken action already.

You’ll learn:

  • How the attack happened and who was responsible?
  • Who is Darkside and what cybersecurity professionals should understand about them
  • Security practices you should put in place to counter ransomware
  • Actionable recommendations to prevent future ransomware incidents

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.