Joseph has worked with some of the world's largest financial services organizations, helping innovate, architect, and develop grid computing farms. He played a critical role in one of the world's largest digital transformations to the cloud that consisted of more than 360 thousand users and is also a certified foreign exchange and money markets trader. Come and learn from Joseph's lessons and experience on adopting Zero Trust and reducing the risks from cyberattacks.
Following in the footsteps of a cyber-criminal and uncovering their digital footprint. This is a journey inside the mind of an ethical hacker’s response to a ransomware incident that brought a business to a full stop, and discovering the evidence left behind to uncover their attack path and the techniques used. Malicious attackers look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access sensitive information. This session will show you the attacker’s techniques used and how they went from zero to full domain admin compromise that resulted in a nasty CryLock ransomware incident.In this session Joseph Carson will cover a real-world incident response to the CryLock ransomware showing the techniques used by the attackers. The footprints left behind and uncovering the techniques used.
Key Takeaways