When it comes to ransomware, cybercriminals are upping the ante. Delivery methods have evolved, payouts are growing in frequency and total cost, and there are more malicious actors participating in ransomware than ever before. 

Since the beginning of 2020, we’ve seen a 600% increase in the number of active ransomware groups. Clearly, threat actors are noticing an easy entry point—particularly through email.

Join this session featuring Theresa Payton, cybersecurity expert and the first female White House CIO, where we’ll discuss why over 76% of ransomware is delivered through email.

Payton will speak with Abnormal Security CISO Mike Britton, answering questions like:

What are the main ransomware attack vectors, and how do they work? 

How have malware and ransomware evolved over the past decade and why are these attacks so much more dangerous today? 

Why are your employees still being held for ransom, despite increased awareness?

What can you do to protect your inboxes (and your organization) from this threat?

And much more. Don’t miss this opportunity to learn about email as the ever-evolving ransomware entry point as we wrap up the Modern Email Attacks series. 

Attendees are eligible to receive 1 CPE credit.

Series #1 - Chris Krebs on BEC Attacks: Email IS Your Biggest Problem

Series #2 - Pwn Stars: Account Takeovers as the Hidden Threat

Generously supported by:

supported by logo
speaker photo
Theresa Payton
First Female White House CIO, CEO of Fortalice Solutions, and 2019 Woman Cybersecurity Leader of the Year

Payton is the cybersecurity expert that organizations turn to for discreet help during data breaches and to improve IT systems and strategies. She made history as the first female to serve as White House Chief Information Officer and currently helps organizations in both the public and private sectors protect their most valuable resources.

Managing cybersecurity risk is what Payton knows and does best. Before overseeing IT operations as CIO for President George W. Bush and his administration, she held executive roles in banking technology for two of the country’s top financial institutions. After serving in the White House, she went on to co-found Dark3, a cybersecurity product company, and Fortalice Solutions, a world-class cybersecurity consulting firm ranked a Top 5 Most Innovative Cybersecurity Company in Northern Virginia, Maryland and Washington, D.C.

Named one of the Top 25 Most Influential People in Security by Security Magazine, Payton was also featured in the book 100 Fascinating Women Fighting Cybercrime and honored as the 2019 Woman Cybersecurity Leader of the Year. Business Insider named her one of the top 50 Cybersecurity Leaders of 2020, CISO Magazine named her Cybersecurity Crusader of the Year in 2020, and Awards Magazine named her one of the Top 50 Women in Tech in 2021. She is the author of several publications on IT strategy and cybersecurity, including Manipulated: Inside the Cyberwar to Hijack Elections and Distort the Truth, released in 2020. Cyber Security Experts named her one of the 100 Most Influential People in Cyber Security in 2021.  

speaker photo
Mike Britton
CISO, Abnormal Security

Mike Britton is the CISO of Abnormal Security, where he leads information security and privacy programs. Prior to Abnormal Security, Mike spent the last six years as the CSO and Chief Privacy Officer for Alliance Data. He brings 25 years of information security, privacy, compliance, and IT experience from a variety of Fortune 500 global companies. He holds an MBA with a concentration in Information Assurance from the University of Dallas.

speaker photo
Tom Bechtold
Digital Event Director, SecureWorld

Tom has been part of the SecureWorld team for over 14 years. He has launched several of the regional conferences we hold today. Tom is currently responsible for SecureWorld Digital, which provides educational content to the SecureWorld audience. He produces, executes, and moderates the majority of the Remote Sessions webcasts while also working closely with the SecureWorld event directors to build relevant agendas at the regional conferences.