Stories From The Team You’ll Never Want To Meet: The Ransomware Response Team

Logo
Presented by

James Knott, Director of the Ransomware Response Team at Rubrik; Kev Johnson, Technical Marketing Architect

About this talk

Have you ever asked yourself, “What happens if I am attacked by ransomware?” This is your chance to hear and learn from the Rubrik Ransomware Response Team, an elite group you’ll hopefully never need to meet, on what it takes to respond to a ransomware attack. They'll walk you through, step-by-step, a real life ransomware scenario and share all their best practices. During this demonstration you will learn: -> What happens when Rubrik is engaged during a ransomware attack and get an understanding of the process our response team undergoes during a typical, real ransomware scenario -> How to be more proactive in securing your environment using the tooling available through Rubrik, with a quick walkthrough of Ransomware Investigation, Threat Hunting, Sensitive Data Discovery and Data Security Command Center. What is the Rubrik Ransomware Response Team, you might wonder? Here’s your answer! Rubrik has been successfully recovering our customers' data from ransomware, cyberattacks, and malware since our early days. Data security is in our DNA, it’s literally built into the fabric of what we do and it’s been there since day #1! With ransomware attacks continuing to increase in volume, sophistication, and severity, Rubrik developed and chartered the Ransomware Response Team to better manage and facilitate customer incident response and data recoveries. Don’t miss out on all the knowledge they drop in this session! Make sure to take a look at the attachments as well - we've added extra learnings on how to optimize data protection and provided you with additional resources to help set you up for success.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (118)
Subscribers (14864)
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.