Monitoring UW Network Ports (Flash Talk)

Pre-Recorded Session


Live Q&A

Friday, June 4th, 2:30 – 3:00 pm

Note: Unfortunately part of this Live Q&A was not recorded. We apologize for the mistake.


Description

This presentation will show how to use existing UW metric backends in your own custom monitoring system. Participants will learn how to use existing data to monitor any UW network port.

Audience needs a general knowledge of metrics and monitoring.


Presenter Information

Ransomware – How it Works and How to Stop it

Pre-Recorded Session


Live Q&A

Friday, June 4th, 8:45 – 9:15 am


Description

Learn how to respond to a ransomware threat proactively, ideally to prevent an attack, or to have the resources to recover if one occurs. Looking beyond the infamous components of an extortion attack – data encryption and demands for ransom – this will cover the most common methods for gaining access, use of lateral movement and privilege escalation, and how an attacker uses fear to increase the chance of getting payment. I will focus on prevention, ideally to stop the attacker from gain access by following best practices in IT security. Logging and monitoring can detect an attack before data is encrypted, although that may not prevent data exfiltration. Effective backup strategy, having backups offline and keeping them long enough that there will be a backup from before the initial compromise, is essential to recovery.


Presenter Information