The Ransomware Crisis...From Every Business Perspective

Date:
November 15- 16, 2023
Location:
SC Media Virtual Event
SC Media eSummit: The Ransomware Crisis...From Every Business Perspective

SC Media is hosting an eSummit from Tuesday, November 15, 10:45 AM ET to Wednesday, November 16, 4 PM ET featuring sessions that will look at ransomware impact, compliance, preparedness, prevention, response and recovery – each from the perspective of a key internal or external stakeholder. 

Bishop Fox is a proud sponsor of the event that will cover topics such as: 

  • Results from CyberRisk Alliance’s exclusive ransomware research
  • Ensuring your ransomware strategy achieves executive buy-in and business alignment
  • Why cyber insurers are denying your applications and how you can change that
  • Strategies for communicating with crisis-fatigued employees, panicking partners and skeptical investors

Register here for free access to all sessions, including a discussion with Bishop Fox's Tom Eston and Trevin Edgeworth.


Ready or Not? Test Your Ransomware Defenses Against Real-World Playbooks

What is our ransomware strategy, and how are you evaluating if it works?”

Have you gotten this question from your leadership? How do you answer it? How do you know?

The fact is the only way to know your ransomware defenses are effective is to either experience a real-world attack – or better yet, to emulate one using the same playbooks the criminal gangs use.

Join our session to see how real-world attack emulations not only help you find opportunities to improve your security ;controls such as detection and prevention techniques, but also the blue team's processes for the current state of preparedness. We will also delve into how to prepare a value map of your Incident Response investments to show ROI to the board and C-suite as well as, illustrate the value of, and build consensus for, recommended improvements.

Join the offensive security experts from Bishop Fox as they break down how to develop a real-world ransomware attack testing methodology and then reap the benefits. You’ll learn how to:

  • Design emulation exercises using the same tactics, techniques, and procedures as real-world adversaries
  • Leverage findings to strengthen your incident response playbooks, security controls, and systems
  • Uncover vulnerabilities in your infrastructure and social engineering avenues that adversaries commonly target
  • Translate outcomes into artifacts that enable business stakeholders to easily understand your strategy and increase investment in future resources.



Trevin Edgeworth

About the speaker, Trevin Edgeworth

Red Team Practice Director

Trevin Edgeworth is the Red Team Practice Director at Bishop Fox, where he focuses on building and leading best-in-class adversary emulation services to help customers of all sizes and industries strengthen their defenses against current and emerging threats.

Trevin has over 20 years of security experience; he has built and overseen red team programs for several Fortune 500 companies, including American Express, Capital One Financial, and Symantec Corporation. Other accomplishments include leading a security organization as Chief Security Officer (CSO) for a major security company. Trevin has led a variety of security functions in his career, including cyber threat intelligence, hunt, deception, insider threat, and others.

Trevin is an active member of the security community. He has presented at several industry conferences and been interviewed by leading publications on topics such as red teaming and threat intelligence.

More by Trevin

Tom Eston

About the speaker, Tom Eston

VP of Consulting and Cosmos at Bishop Fox

Tom Eston is the VP of Consulting and Cosmos at Bishop Fox. Tom's work over his 15 years in cybersecurity has focused on application, network, and red team penetration testing as well as security and privacy advocacy. He has led multiple projects in the cybersecurity community, improved industry standard testing methodologies and is an experienced manager and leader. He is also the founder and co-host of the podcast The Shared Security Show; and a frequent speaker at user groups and international cybersecurity conferences including Black Hat, DEF CON, DerbyCon, SANS, InfoSec World, OWASP AppSec, and ShmooCon.
More by Tom

Ready to get started? We can help.

Contact Us

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.