Targeted Hacking and Ransomware
Share this program:
March 9, 2021
Ohio Association of Civil Trial Attorneys
Join Exponent experts as they discuss scenarios such as, controlling somebody else’s automobile on the highway from the comfort of home, embezzling money using ransomware (and not getting caught), and breaching networks to steal precious data. These and other scenarios are possible in our modern, connected world.
The Exponent experts will draw on recent examples to describe the malicious actor’s playbook from start to finish. This webinar will cover reconnaissance; attack surface analysis; how attackers gain an initial foothold; exploitation; escalation; lateral movement; ransom techniques; payment issues; and the aftermath. This presentation will conclude with a discussion of associated cyber policies, claims, and trends.
Program Titles and Supporting Materials
This program contains the following components:
If applicable, you may obtain credit in multiple jurisdictions simultaneously for this program (see pending/approved list below). If electing credit for this program, registrants in jurisdictions not listed below will receive a Certificate of Completion that may or may not meet credit requirements in other jurisdictions. Where applicable, credit will be only awarded to a paid registrant completing all the requirements of the program as determined by the selected accreditation authority.
How to Attend
Join the self-paced program from your office, home, or hotel room using a computer and high speed internet connection. You may start and stop the program at your convenience, continue where you left off, and review supporting materials as often as you like. Please note: Internet Explorer is no longer a supported browser. We recommend using Google Chrome, Mozilla Firefox or Safari for best results.
You may access this course on a computer or mobile device with high speed internet (iPhones require iOS 10 or higher). Recommended browsers are Google Chrome or Mozilla Firefox.