| Home | About | Insights | 0
  • Your Shopping cart is empty.

Recovering from Ransomware and Other Destructive Events

Learn how to plan, design and implement your system architecture for maximum data integrity

Recovering from Ransomware and Other Destructive Events

Data integrity attacks have compromised corporate information including emails, employee records, financial records, and customer data.

Destructive malware, ransomware, malicious insider activity, and even honest mistakes all set the stage for why organisations need to quickly recover from an event that alters or destroys data. Businesses must be confident that recovered data is accurate and safe.

This Deslyon training event demonstrates how organisations can develop and implement appropriate actions following a detected cybersecurity event.  The solutions outlined during this event will encourage monitoring and detecting data corruption in commodity components as well as custom applications and data composed of open-source and commercially available components.

Who Should Attend The Recovering from Ransomware and Other Destructive Events Training?

This training course is intended to help a wide variety of organisations understand the threats posed by malware and mitigate the risks associated with malware incidents.  It provides practical, real-world guidance on recovering from malware incidents and responding to malware incidents in an effective, efficient manner.

It is aimed at managers and technical team members who are responsible for the implementation and ongoing management of data integrity within their organisations.

Course Content

  • Data Integrity Challenges
  • Risk Assessments
  • Architecture
  • Implementing for Integrity
    • Ransomware
    • File Modification
    • VM Deletion
    • Active Directory Prmissions
    • Database Transactions
    • Database Metadata Modification
  • Security Characteristics Analysis
    • Assumptions and Limitations
    • Analysis of Reference Design
      • Configuration Change Control
      • Effective Back-ups
      • Data-at-Rest
      • Integrity Checking
      • Audit Logs
      • Personnel Activity Records
      • Network Activity
      • Physical Environment
      • Response and Recovery Plans
      • Event Impact
  • Functional Evaluation
    • Data Integrity Functional Test Plan

What's Included?

  • Colour Printed Course Notes
  • Teas, Coffees, Refreshments (during break)

Course Timing

Duration: 1 Day

Time: 09:00am – 4:00pm


Central London

Location To Be Confirmed

Call Us

+44 (0) 203 468 5898