A Guide to Incident Response Framework: Ransomware Negotiations 

You are here:

Date: February 15, 2024
Time: 9:30 AM EST | 8:30 AM CST | 8:00 PM IST
Topic: A Guide to Incident Response Framework: Ransomware Negotiations

Watch Now

Abstract: This webinar session provides real-world-based training focused on the Incident Response (IR) forensics vendor’s viewpoint of interacting, negotiating, and settling with a ransomware threat actor. Including what role the IR vendors have, what nuances and interactions these dealings bring, and how to engage confidently with the client and other stakeholders.

Key takeaways:

  • Overview of ransomware negotiations
  • Common reasons why you will engage the threat actor as a security expert
  • Role of an infinite mindset toward building a holistic security approach
  • Understanding the stages of a ransomware negotiation
  • Dealing with stakeholders during a negotiation
  • Where ransomware negotiations fall within the overall incident response effort.

PatricEder Ribeiro, Senior Cybersecurity Program Manager

Bio: Eder graduated from Roger Williams University School of Law, earning his Juris Doctor. He has also earned a Master of Science in Cyber Security. He has led TransUnion’s Incident Response Forensics (IRF) team over the last six years. In his “leading from the front” style, Eder has led the IRF team through thousands of cases ranging from unauthorized cryptocurrency mining, ransomware, business email compromises, and much more.

Eder also has 16 years of experience in the United States Rhode Island Army National Guard, where he led troops as a team leader on a combat deployment in the Kandahar Province in support of Operation Enduring Freedom. Eder is a certified mediator and performs duties at the state headquarters level. Eder’s expertise includes solution/product creation, program development and expansion, threat assessment, risk mitigation, security process improvement, privacy compliance, and contract drafting. He has worked with over 1,000 organizations in his current capacity, helping them determine and react to the nature of their security incident breaches and determining the best course of action to recover to safe operations and meet compliance obligations.

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)

Share this Article
You may also like

Train with EC-Council

Cyber Talks
Recent Posts