ITQonversations - 'The Ransomware Chain' by Barry van Kampen, Technologist Security at ITQ.

The ransomware operating model by criminals works in a structured way, 6 different phases on high level can be defined:
- Initial Access: how do criminals get there first step into your organization
- Securing Access: how do criminals compromise you whole network
- Exfiltration of data: where criminals steal the company data
- Impact fase: where organizations get locked
- Recovery: how to get back in business
- “The unknown”: what happens next after recovery?

In this video our Technologist security Barry van Kampen will explain how criminals will work and who the options are to protect yourself against it.

Thanks for watching this video! Don't forget to subscribe to our channel because a lot of cool and interesting videos are coming online! ✌️

Also check out our ITQonversations Playlist:

Curious about ITQ? Take a look at our website:

#ITQonversations #ITQ #ransomware #security

Related articles

  • Cloud Native
  • Implementation and Adoption
  • Platform Engineering
  • Digital Workspace
  • Hybrid Cloud
  • ITTS (IT Transformation Services)
  • Managed Security Operations
  • Managed Cloud Platform
  • Backup & Disaster Recovery
Visit our knowledge hub
Visit our knowledge hub
Barry van Kampen Security Technologist

Let's talk!

Knowledge is key for our existence. This knowledge we use for disruptive innovation and changing organizations. Are you ready for change?

"*" indicates required fields

First name*
Last name*