Sveavägen 48, Stockholm, Miss Clara Hotel
Growing Threat of RansomWare
Your money or your files! Criminals are extorting money from online banks, retailers and other web businesses by injecting malicious software that immobilizes a site, and demanding ransom to call off the attack. Ransomware poses a serious threat since it can affect MS Windows, Mac OS X or Linux. The strength of the encryption can lock important files such as images, videos, audio, PDF files, MS Office files, and other types of files and apps. FBI's Internet Crime Complaint Center (IC3) claims that between April 2014 and June 2015, victims reported losses totaling over $18 million.
Points to be learned
- Typical RansomWare schemes and how they work
- Recovery plan: How to minimize damage if you got infected
- Smart investment strategies into your cyber security
- Experience life hack as it was for real
REGISTRATION AND COFFEE
INTRODUCTION & OPENING REMARKS
Most networking talk is forgettable because it’s so generic. No one shares much and they stay clear of controversial topics. While it’s not good form to provoke an argument, it is fine to share your opinion. In fact, being brave enough to be real with others, and to allow yourself to be a well-rounded and interesting person is far better than the alternative. Come prepared and Be ready to share something.
Let's make every minute of your time worth it.
9 SEK INVESTMENT vs 90K SEK LOSS?
What’s the real value of your data? Small to mid-size organizations are the cyber criminals sweet spot. Data is a critical part of every organization, but this most valuable asset often poses a huge risk when it travels or is transmitted beyond the corporate network.
What is the value of your and your customers data?
Cyber criminals are finding new ways. Are you their target?
Jim SadejeffESET Sales Director
NETWORKING & REFRESHMENTS
ESET DECRYPTER FOR TESLA CRYPT RANMSOMWARE
Have you heard of of the notorious ransom ware TeslaCrypt? One of ESET’s analysts contacted the group anonymously, using the official support channel offered to the ransomware victims by the TeslaCrypt’s operators, and requested the universal master decryption key. Surprisingly, they made it public!
Is it possible for us to get infected?
What’s the best protection for my organization?
If infected - How to minimize damage?
Righard J. ZwienenbergESET Senior Research Fellow
Two interactive round-tables where you can bring up your own practice, experience and questions.
Solutions in Critical Environments.
Righard J. Zwienenberg
Senior Research FellowModerator
LUNCH& NETWORKING ZONES
DEMO: EXPERIENCE A LIVE HACK
Anders Nilsson will guide you through a pen-test that exploits critical vulnerabilities. A unique live hack experience you might not want to go through for real.
Anders NilssonESET CTO
SUMMARY OF THE DAY
Learn to ask great questions that get others to talk. Let us know what you think about the information we've shared and feel free to challenge the speakers.
Asking for advice. It can be both a conversation starter, and a useful way to get helpful information.
Stay a bit longer for an individual consultation that is going to take place after the summary.
|attendees||sessions||best rated speaker||best rated session|
|25||5+||Righard J. Zwienenberg||DEMO: EXPERIENCE A LIVE HACK|
Events only news: