COVID-19 , Critical Infrastructure Security , Cybercrime as-a-service

Building an Effective Ransomware Mitigation Strategy

Crowdstrike's Jennifer Ayers on Understanding the Indicators of Attacks
Jennifer Ayers, vice president, Overwatch and security response, Crowdstrike

To mitigate the risks posed by ransomware attacks, enterprises need to move from file-based security to a behavior-based approach, says Jennifer Ayers, vice president of the OverWatch division and incident response at Crowdstrike.

See Also: OnDemand | Combatting Rogue URL Tricks: How You Can Quickly Identify and Investigate the Latest Phishing Attacks

The company’s 2020 threat hunting report reveals new forms of ransomware attacks and describes how security teams can build an effective incident response mechanism.

In this video interview with Information Security Media Group, she offers insights on:

  • New types of ransomware attacks;
  • How enterprises can rebound from such attacks;
  • Ways to build effective threat detection and incidence response capabilities.

With over 20 years of cybersecurity experience, Ayers, is responsible for a Crowdstrike team that hunts for malicious activity in globally diverse environments and pinpoints the most urgent threats for quick remediation with the integration of next-generation technology and machine learning.


About the Author

Geetha Nandikotkur

Geetha Nandikotkur

Vice President - Conferences, Asia, Middle East and Africa, ISMG

Nandikotkur is an award-winning journalist with over 20 years of experience in newspapers, audiovisual media, magazines and research. She has an understanding of technology and business journalism and has moderated several roundtables and conferences, in addition to leading mentoring programs for the IT community. Prior to joining ISMG, Nandikotkur worked for 9.9 Media as a group editor for CIO & Leader, IT Next and CSO Forum.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.