Why Your Organization’s Critical Infrastructure May Be Vulnerable to Ransomware

View On-Demand Webinar

View On-Demand Webinar

cybersecurity 101

Ransomware is a form of malware that corrupts your systems and/or networks, preventing you from accessing your computer files and even threatens to publish the victims data unless the ransom is paid.

Data that is most commonly extracted:

  • Personal Identifiable Information (PII)
  • Trade Secrets
  • Intellectual property

Join our cybersecurity experts to gain an understanding of the background of ransomware at a high level to minimize the risk to your business' continuity, finances and reputation.

Complete the form to view the on-demand webinar!


Our webinar will tackle these points:

  • Security program (Technologies, People, and Processes)
  • Security education and who should get it
  • Importance of frameworks
  • Compliance vs. Certification

About the speakers

Ed Chandler Employee SpotlightEd Chandler

Account Executive and Cybersecurity Lead, TÜV SÜD 

Ed Chandler has worked in the technology field since 2010, and Cybersecurity since 2011. During this time he has had great success working for organizations such as Trustwave, Great Bay Software, and Virtual Forge. In Cybersecurity he has had the opportunity to work with organizations in sectors such as: Financial Services, Education, Government, Healthcare, and Manufacturing.

During Ed’s time with Trustwave, he assisted large and complex government organizations not only implement PCI-DSS programs, but also ensure those programs were adopted by the greater organizations. At TÜV SÜD, Ed is an Account Executive for the Central Region as well as the Cybersecurity Lead for Business Assurance.

 

Michael Penders

Cyber Security Program Manager/ Lead Auditor at TUV SUD

Michael has over 25 years experience in cybersecurity, compliance, and risk management. He’s been a speaker at major conferences, before Congress, and chaired an international group of experts which developed standards for integrated security/risk management.

He designs, implements, and audits Enterprise Risk Management and Information Security Management Systems conforming to ISO and National Standards.

Next Steps

Site Selector