By browsing this site, you are agreeing to our cookie policy. More Information

Ransomware: Petya/NotPetya Now, But What About Tomorrow?

60 min

Ransomware like Petya/NotPetya and WannaCry is here to stay, and this new and devastating family of malware is causing fire drills and increasing business risk for security teams and the data they protect on countless endpoints.

Beyond patching, security updates, and closing ports, what’s the real key takeaway from ransomware attacks? It is absolutely imperative that companies identify their enterprise’s most sensitive data and have incident response plans and processes in-place before attacks like these happen.

Join us on July 6 for the chance to learn from and ask questions of our incident response and malware experts, including:

  • In the event of a successful ransomware attack, what analysis should be performed and what steps are critical to an incident response investigation
  • How to identify levels of data risk, and prioritize what endpoints are attractive for targeted ransomware attacks
  • Advice from a day-in-the-life incident response expert, and the role endpoint detection and response (EDR) tools play in a state of continuous compromise How to mitigate the risks of a breach


  • Neil Torpey, Incident Response Team, Guidance Software
  • Roger Andras, Principal Solution Consultant, Guidance Software
  • Charles Choe, Sr. Product Marketing Manager, Guidance Software

Related Topics:
Incident Response , Incident Detection

Related Products:
EnCase Endpoint Security

You May Also Like


Navigating a Breach & Activating a Proven Incident...

Modern threats and targeted attack methods are increasingly efficient at breaching organizations and gaining access to valuable data. With more emphasis than ever on protection, prevention and the per...

Data Breaches & 5 Key Elements of an Effective Inc...

With severe data breaches becoming an almost weekly occurrence, there are plenty of best practices both pre- and post-incident to help security teams avoid the headlines. The modern CISO should expec...