IBM Guardium

IBM Guardium

Join this online user group to communicate across Security product users and IBM experts by sharing advice and best practices with peers and staying up to date regarding product enhancements.

 View Only

Fight Double Extortion and Ransomware with Modern Data Security Webinar 

Thu February 17, 2022 04:25 PM

Watch the On-Demand Webinar Today.

The slides are available to download below and please share any of your questions here

Summary

Ransomware attacks are on the rise in both volume and sophistication. Ransomware-as-a-service is making it cheaper than ever to deploy ransomware attacks, while double extortion—where data is both encrypted and exfiltrated—is making the monetary and reputational damage worse. Today’s cybercriminals are persistent and have access to cheaper and more sophisticated tools. So when attackers breach your digital castle walls, how will your company defend its crown jewels of data?
Modern data security techniques and controls can stop an attack dead in its tracks, but only if they are configured and deployed effectively before a breach. In this webinar, data security experts from IBM Security and Thales will discuss:

  • How ransomware attacks succeed by exploiting the limitations of basic security tools.
  • How the right encryption at all levels, application allow listing, and granular access controls can combat lateral movement, imposters, trojan horses and data extortion attempts.
  • How IBM Security Guardium Data Encryption helps users stop ransomware attacks before their critical data is compromised. (This section will include a product demo.)
This webinar will also feature live Q&A.

Speakers:



Rick Robinson, Sr. Sales Engineer, Thales

Rick is a Sr. Sales Engineer at Thales, former Offering Manager for Encryption and Key Management for the Data Security Group at IBM Security, regular speaker at IBM conferences, and a contributor to SecurityIntelligence.com.

Throughout his career, has consulted with customers on encryption and key management architectures for securing data at rest, data at transit, and data in use for real-time and high-velocity applications.

Rick has authored or co-authored thirteen patents, many in the area of computer security and cryptography. Rick holds a Bachelor and Master of Science Degrees in Electrical Engineering as well as an MBA.

In addition, he holds certifications from the Information Systems Security Certification Consortium (ISC2), is a member of the Storage Network Industry Association Storage Security Industry Forum (SNIA-SSIF), participates on the OASIS-KMIP technical committee, is a past Section Chair of IEEE, and past participant in the IETF.

In his spare time, Rick investigates the applications of technology to improve election integrity.



Polly Lau, IBM CyberSecurity Technical Specialist

Polly is an Cybersecurity technical consultant with seventeen years of IT professional experience and 12 years specializing in data security. She's been in wide variety of experiences from different roles including technical sales engineer and technical enablement, as well as Director at one of the largest Canadian financial services company leading the enterprise-wide Data Security program. Recognized as a subject matter expert in designing and implementing integrated Data Security solutions to meet challenging business and compliance needs. Extensive experience in creating technical content including IBM Guardium technical certification exams, articles, and demos.



Patrick Ancipink, Sr. Product Marketing Manager, IBM Security

Patrick is a senior product marketer with IBM Security and focused on data security and privileged access management. He has over two decades of diverse experience in enterprise software—from global leaders to disruptive start-ups--and works to ensure that customer-centric initiatives are the design point for technology solutions. After completing his education at Yale University, Patrick started his tech career in a mail room in Silicon Valley and found his way to Austin, TX, where he currently lives with his wife in happy denial about becoming empty nesters.

Statistics
0 Favorited
16 Views
1 Files
0 Shares
6 Downloads
Attachment(s)
pdf file
Fight Double Extortion and Ransomware with Modern Data Se....pdf   675 KB   1 version
Uploaded - Thu February 17, 2022