When Ransomware Strikes: Ethical Hacking for Enterprise Defense 

You are here:
Date: October 24, 2025 
Time: 7:00 PM IST | 9:30 AM EDT | 8:30 AM CDT

Topic: When Ransomware Strikes: Ethical Hacking for Enterprise Defense

Watch Now

Abstract: Ransomware continues to be one of the most disruptive and costly threats to organizations across the globe. As security priorities shift from reactive to proactive, the need to leverage ethical hacking techniques to identify vulnerabilities, simulate real-world attack scenarios, and strengthen defenses against ransomware has become imperative. This webinar provides an understanding of how ethical hacking can be used to uncover vulnerabilities before adversaries do and how it aligns with incident response planning, threat modeling, and Zero Trust principles to build a resilient enterprise security posture.

Key Takeaways: 

  • Understand ransomware attacks and how ethical hacking knowledge can help safeguard organizations.
  • Learn to simulate ransomware attacks using ethical hacking tools and techniques.
  • Discover common TTPs used by ransomware actors.
  • Explore how red teaming supports ransomware readiness and response.
  • Gain insights into integrating offensive tactics into your broader security strategy.

Speaker:

Harinderjeet Singh Walia, Senior Regional Manager, Critical Incident Response, Forcepoint

Bio:  Harinderjeet Singh Walia is an Indian Air Force veteran and accomplished cybersecurity leader with more than 25 years of experience safeguarding high-security environments. He has a distinguished record of protecting critical information infrastructure, leading incident response operations, and driving enterprise-wide cybersecurity transformation initiatives. His expertise includes penetration testing, digital forensics, threat intelligence, and enterprise security architecture design, enabling robust defense against evolving cyber threats. Harinderjeet is also passionate about mentoring professionals, with a focus on aligning security strategies with business objectives and regulatory requirements.

Share this Article

Facebook
Twitter
LinkedIn
WhatsApp
Pinterest

You may also like

Train with EC-Council

  • By clicking the Submit button, I give my consent to the processing of my personal data, including for promotional purposes, as provided in the Privacy Policy, and agree to the Terms.

Cyber Talks
Recent Posts