Ransomware: Prevention, Response, and Recovery

Ransomware attacks are at unprecedented levels; be prepared

Watch On-Demand
Ransomware prevention response recovery

Event Information

  • 30 minutes

Strategies for the before, during, and after of an attack

In a recent survey of 1,000 Microsoft 365 administrators worldwide, nearly half indicated they had faced a ransomware attack in the last year. Other studies have forecasted that by 2025, 75% of organizations will face one or more ransomware attacks.

It’s clear—anyone responsible for safeguarding organizational data MUST implement robust security policies and mechanisms specifically to ward off these cyberattacks. As recent events have shown, this needs to include assessing the risk from and across your vendor supply chain.

Prudence also dictates implementing robust response plans to mitigate organizational and reputational risk in the ever-increasing likelihood of a successful attack.

Finally, it is imperative to have a ransomware recovery solution in place to ensure business continuity and day-to-day operations remain unaffected. The cost of downtime can be even more costly than paying a ransom, so we will show you how to avoid both with ransomware recovery best practices.

Featured Speakers

  • Dana Simberkoff

    Chief Risk, Privacy, and Security Information Officer, AvePoint

  • Henry Feliu

    Manager, Information Technology, AvePoint

  • James Nankervis

    Information Security and Privacy Analyst, AvePoint

  • Alex Varvel

    IT Administrator, AvePoint

In this webinar you will learn:

  • Technology Best Practices

    How to use Microsoft 365 security solutions like Microsoft Defender to protect against ransomware; solutions for evaluating third-party risk and how to recovery from ransomware with third-party cloud backup solutions.

  • Policy Best Practices

    How you can implement policies to reduce the likelihood of a successful attack. We will also show the must have components of a ransomware response plan.

  • People Best Practices

    How to build a successful security, privacy and ransomware response team. How to build a culture of security with proactive training and communications.


Register to Watch

Fields with * are required