Kemp Demo Ransomware Detection & Response
Event: Security Field Day 5
Appearance: Kemp Presents at Security Field Day 5
Company: Kemp
Video Links:
Personnel: Pavel Minarik
A complex network compromise scenario evolving from initial exploitation through lateral movement, data hoarding and exfiltration over an alternative protocol followed by the final impact through data encryption. Detection of individual indicators of compromise within the network traffic flows as the attack is progressing allows the security operator to respond properly and on time.