Qubit Conference Prague 2022 - Program Guide
Conference opening - Maria Krahulecova & Ondrej Krehel
CEO & Co-founder | Qubit Conference
Why do companies need tabletop exercises?
Tabletop exercises are a terrific opportunity for companies to prepare for unexpected. Incident response plans and other documentation are an essential part of a company’s maturity in cybersecurity. All plans should be tested, and it is always better to test it outside an actual cyber crisis.
Tabletop exercises offer companies an opportunity to try to work together as a team in times of crises and see what could be improved and which parts of the crises the company is managing well. In this presentation we will show the most common mistakes that companies are making in exercises and during the major breaches. Who will be making the decision in your company whether to pay or not to pay the ransom and based on which information decision will be made?
Case study: The First 48 Hours
The first 48 hours after a cyber incident are the most critical time for an organization that has been the victim of a cyber crime. Who? What? Where? How? Why? These are questions every business that has been a victim of a cyber crime want answers to as fast as possible. This presentation will go through the steps that need to be taken to stabilize the victim’s environment, preserve the potential evidence, deal with the threat actors, and mitigate the situation.
Stop Chasing, Start Defending: Preventing Ransomware with Zero Trust abstract
An increasing number of MSPs have reported being victims of ransomware attacks. Cybercriminals are exploiting MSP products and services, including remote monitoring and management (RMM) tools. These tools are often accessed through software vulnerabilities or brute force attacks. Is your MSP prepared to protect against ransomware? Join Ben Jenkins, ThreatLocker Senior Solutions Engineer as we discuss what you can do to prevent cybercriminals from carrying out an attack.