Ransom Attack: What Happens Next?
This session is at capacity, however it will be broadcast live again on June 26 - Register now!
June 16, 2020
1:00–2:00 p.m. ET
It's no longer a matter of if, but when a ransom attack against critical systems will occur. Many organizations are not fully prepared and lack an understanding of what happens next. This session will walk through a real-life ransomware attack scenario and discuss how internal audit can learn from these events when they occur. Key controls to implement to reduce post-event pain will also be discussed.
In this session, participants will:
- Learn from a breakdown of a real-life ransom attack.
- Understand the key challenges facing organizations when a ransom attack occurs.
- Identify which controls and processes should be in place to help reduce the post-event pain.
- Develop a communication process to assure management support of contingency plans.
Course Duration: 1 hour
CPEs Available: 1
Knowledge Level: Basic
Field of Study: Information Technology
Advance Preparation: None
Delivery Method: Group Internet Based
Scott Madenburg, CIA, CRMA, CISA
Director of Account Management, AuditBoard
Scott Madenburg is the Director of Account Management at AuditBoard, working with various internal audit and compliance teams to help automate the administrative tasks of audit, risk, and compliance activities. Madenburg is an internal audit leader with over 15 years of global business experience in financial, information system, operational, and compliance auditing; Sarbanes-Oxley; business process evaluation and design; ERP system implementation and administration; mergers and acquisitions; cybersecurity; and fraud investigation. He began his career at Arthur Andersen before transitioning into internal audit with Fox Entertainment & News Corporation and Gemstar-TV Guide/Rovi Corporation. Prior to joining AuditBoard, Madenburg was the head of audit at Mobilitie LLC, where he built the internal audit function from the ground up to an eight-person department focusing on agile audits, cyber and IT security, and FCC compliance.