The talk, Navigating a Live Ransomware Attack, will share case studies showing how to holistically navigate through each stage of a ransomware attack from pre-attack, during, and post the attack. Join our Global Head of Threat Intelligence, Lead Incident Responder, and Solutions Consultant to hear their experiences in each stage to help better prepare you and your organization.
Join us to learn how to:
Building your own ransomware mitigation strategy involves learning from other incidents and hearing from experts that have responded to attacks. This virtual conference offers that opportunity. Register today!
Global Head of Threat Intelligence, F-Secure
Callum is the Head of Threat Intelligence for F-Secure with a history of responding to threat actors on the frontline in incident response, threat hunter and SOC analyst roles. Callum is passionate about all things security and has a wide range of experience delivering services and consultancy across a variety of industries.
North American Lead for Incident Response, F-Secure
Jordan is a Managing Consultant and Incident Response Investigator, responsible for leading IR, attack detection, and digital forensics training. He has driven penetration testing and IR services for clients worldwide, developed the 24/7 US IR consulting capability, and presented his own research into a spectrum of infosec topics
Lead Solutions Consultant, F-Secure
Joshua is the lead Solutions Consultant for F-Secure's North American Countercept Managed Detction and Response practice. Joshua maintains a CISSP, and has helped organizations of all sizes over his 20+ year career to better understand and meet the challenges of an embarrassment of cyber-security, risk, and compliance requirements.
Strategic Business Manager, F-Secure
Casey works with security organizations all over North America for F-Secure. With over a decade of experience working with enterprise level solutions, Casey specializes in implementing cyber defense programs across finance, media and other sectors. Casey is passionate about risk-led security decisions and enabling security teams to keep up with the rapid pace of change in the cyber threat landscape.