Investigating Ransomware and IoT Vulnerabilities

Cybercrime continues to rise sharply as threat actors go after industrial targets that can be worth millions in ransomware payments.To help security defenders fight back, Nozomi Networks Labs will share insight from its new research in to the current security landscape.

Join us for a discussion on:

  • Ransomware
  • Why ransomware is such a formidable threat
  • How Ransomware as a Service (RaaS) works
  • DarkSide, the malware that attacked Colonial Pipeline
  • New research findings on ICS and medical device vulnerabilities
  • How security camera vulnerabilities threaten business confidentiality and open the door to malware

View Resource

Speakers

Investigating Ransomware and IoT Vulnerabilities

Investigating Ransomware and IoT Vulnerabilities

Cybercrime continues to rise sharply as threat actors go after industrial targets that can be worth millions in ransomware payments.To help security defenders fight back, Nozomi Networks Labs will share insight from its new research in to the current security landscape.

Join us for a discussion on:

  • Ransomware
  • Why ransomware is such a formidable threat
  • How Ransomware as a Service (RaaS) works
  • DarkSide, the malware that attacked Colonial Pipeline
  • New research findings on ICS and medical device vulnerabilities
  • How security camera vulnerabilities threaten business confidentiality and open the door to malware

Speakers

Investigating Ransomware and IoT Vulnerabilities

Cybercrime continues to rise sharply as threat actors go after industrial targets that can be worth millions in ransomware payments.To help security defenders fight back, Nozomi Networks Labs will share insight from its new research in to the current security landscape.

Join us for a discussion on:

  • Ransomware
  • Why ransomware is such a formidable threat
  • How Ransomware as a Service (RaaS) works
  • DarkSide, the malware that attacked Colonial Pipeline
  • New research findings on ICS and medical device vulnerabilities
  • How security camera vulnerabilities threaten business confidentiality and open the door to malware

Take the next step.

Discover how easy it is to identify and respond to cyber threats by automating your IoT and OT asset discovery, inventory, and management.