Awwwards

Growing Threat of RansomWare

Your money or your files! Criminals are extorting money from online banks, retailers and other web businesses by injecting malicious software that immobilizes a site, and demanding ransom to call off the attack. Ransomware poses a serious threat since it can affect MS Windows, Mac OS X or Linux. The strength of the encryption can lock important files such as images, videos, audio, PDF files, MS Office files, and other types of files and apps. FBI's Internet Crime Complaint Center (IC3) claims that between April 2014 and June 2015, victims reported losses totaling over $18 million. 

Points to be learned

  1. Typical RansomWare schemes and how they work
  2. Recovery plan: How to minimize damage if you got infected
  3. Smart investment strategies into your cyber security 
  4. Experience life hack as it was for real
  • 3

    topics

  • 5

    hours

  • 3

    discussions

  • 25

    key participants

Participants

Program

Print out
program icon
08:45 - 09:00

REGISTRATION AND COFFEE

program icon
09:00 - 09:15

INTRODUCTION & OPENING REMARKS

Most networking talk is forgettable because it’s so generic. No one shares much and they stay clear of controversial topics. While it’s not good form to provoke an argument, it is fine to share your opinion. In fact, being brave enough to be real with others, and to allow yourself to be a well-rounded and interesting person is far better than the alternative. Come prepared and Be ready to share something. 

Let's make every minute of your time worth it. 

program icon
09:15 - 09:45

9 SEK INVESTMENT vs 90K SEK LOSS?

What’s the real value of your data? Small to mid-size organizations are the cyber criminals sweet spot. Data is a critical part of every organization, but this most valuable asset often poses a huge risk when it travels or is transmitted beyond the corporate network.

What is the value of your and your customers data?

Cyber criminals are finding new ways. Are you their target?

Jim 	Sadejeff

Jim Sadejeff

ESET Sales Director
program icon
09:45 - 10:15

NETWORKING & REFRESHMENTS

program icon
10:15 - 10:45

ESET DECRYPTER FOR TESLA CRYPT RANMSOMWARE

Have you heard of of the notorious ransom ware TeslaCrypt? One of ESET’s analysts contacted the group anonymously, using the official support channel offered to the ransomware victims by the TeslaCrypt’s operators, and requested the universal master decryption key. Surprisingly, they made it public!

Discussion Points: 

Is it possible for us to get infected?

What’s the best protection for my organization?

If infected - How to minimize damage?

Righard 	J. Zwienenberg

Righard J. Zwienenberg

ESET Senior Research Fellow
program icon
10:45 - 11:30

ENDPOINT SECURITY

Two interactive round-tables where you can bring up your own practice, experience and questions. 

  1. Solutions in Critical Environments.
    Anders 	Nilsson

    Anders Nilsson

    ESET

    CTO

    Moderator
  2. Disasters Recovery.
    Righard 	J. Zwienenberg

    Righard J. Zwienenberg

    ESET

    Senior Research Fellow

    Moderator
program icon
11:130 - 12:30

LUNCH& NETWORKING ZONES

program icon
12:30 - 13:00

DEMO: EXPERIENCE A LIVE HACK

Anders Nilsson will guide you through a pen-test that exploits critical vulnerabilities. A unique live hack experience you might not want to go through for real.

Anders 	Nilsson

Anders Nilsson

ESET CTO
program icon
13:00-13:15

SUMMARY OF THE DAY

Learn to ask great questions that get others to talk. Let us know what you think about the information we've shared and feel free to challenge the speakers. 

Asking for advice. It  can be both a conversation starter, and a useful way to get helpful information. 

program icon
13:15-14:00

OPEN NETWORKING

Stay a bit longer for an individual consultation that is going to take place after the summary. 

Post event

attendeessessionsbest rated speakerbest rated session
255+ Righard J. ZwienenbergDEMO: EXPERIENCE A LIVE HACK