Executive's Guide to the Business of Malware

Sign-Up to Access Recording

Executive's Guide to the Business of Malware

Cyber thieves, like their non-virtual counterparts, are in it for the money. It's an aspect of hacking that's missed when we focus on the techniques and cool tricks hackers use to get into and move around systems. Like regular thieves, after they grab the goods, hackers monetize their stolen data by going to a "fence"—basically a broker who can match criminal buyers and sellers.

In this webinar, we'll look more closely at how these dark exchanges influence the types of data that are targeted. And we'll also see why ransomware attacks have become a major new source of income for hackers. To begin, let's examine these dark markets and how the buying and selling of stolen data are actually carried out.

We will also go through how you can use the Lepide Data Security Platform to detect and react to the spread of ransomware in your environment.

The session will last approximately 45 minutes with time at the end for a Q&A.

Danny Murphy
Danny Murphy

Head of Technical Delivery

Phil Robinson
Phil Robinson

Head of Marketing