Telecom Networks Are Being Targeted by Hackers!
Hackers are increasingly looking at large telecom networks as part of their shift to “big game hunting” -- targeting larger, more revenue-rich organizations. In fact, the LightBasin hacking group infiltrated as many as 13 telecom networks by targeting many telecommunications-specific systems.
This pressure has put carrier IT departments on the front line of defense — but how can you prepare for this type of attack, much less mitigate it? What happens if an attacker compromises administrative credentials (e.g. Active Directory, storage systems, data backups)?
Join this session, led by Pure’s Andrew Miller, to learn about these topics and more:
The Ransomware Landscape
An in-depth anatomy of an attack and explanation of new attack vectors, including admin credential compromise. We’ll stay away from FUD, but life is sometimes scary.
Defense in Depth
It’s critical and easy in theory. So why are people still paying ransoms? (Clue: Complexity)
Solutions
- We’ll explore what you can do in the event of an attack, both in general and with a focus on Pure’s capabilities on FlashArray and FlashBlade.
- Pure has a simple-plus-unique combination of fast restore and “immutability plus” that can help even in the event of admin credential compromise.
Speaker and Presenter Information
Andrew Miller
Principal Technology Strategist, Pure Storage
Relevant Government Agencies
Other Federal Agencies, Federal Government, State & Local Government
Event Type
Webcast
This event has no exhibitor/sponsor opportunities
When
Wed, Jan 26, 2022, 2:00pm - 3:00pm
ET
Cost
Complimentary: $ 0.00
Website
Click here to visit event website
Organizer
Pure Storage





