<img alt="" src="https://secure.badb5refl.com/165368.png" style="display:none;">

Addressing the Vulnerabilities Used in 63.5% of Ransomware Attacks

What are the top vulnerabilities used in successful ransomware attacks? They lie within the Microsoft Remote Desktop Protocol (RDP) which is widely used to provide remote users with access to in-office systems, servers and files.

Register to watch the recording featuring experts who work every day to eliminate these risks for companies large and small.

Register to Save Your Spot

Discussion Points

How to Minimize Vulnerabilities

Steps you can take to minimize and eliminate vulnerabilities

Vulnerability Indicators

How to spot the indicators that you may be vulnerable

Common Mistakes

The most common mistakes that open the door to successful attacks

Real-World Examples

Real-world examples to illustrate the recommendations

Jeremy Rasmussen 3


Jeremy Rasmussen

CTO, Abacode Cybersecurity

Abacode, Inc. is a Tampa, Florida based company that provides managed cybersecurity and compliance programs to businesses across all industries. He is also an adjunct professor at the University of South Florida and founder of the USF Whitehatters Computer Security Club (WCSC). Since 2000, he has taught courses in cryptography & network security, ethical hacking, digital forensics & investigations, and mobile & wireless security. For nearly 30 years, he has performed research & development of cyber solutions and built cyber services teams for government and commercial customers. Jeremy is a Certified Information Systems Security Professional and Certified Ethical Hacker. He was named 2017 Tampa Bay Technology Leader of the Year.

Roy Caswell


Roy "Caz" Caswell

CIO, The Liberty Company Insurance Brokers, Inc.

My goal is to provide exemplary strategic alignment of IT to maximize top-line growth, bottom-line efficiencies, and savings. Skilled at building and empowering a team of truly dedicated and highly skilled technology professionals. Progressive IT management experience specializing in full responsibility for nationwide enterprise consisting of 60 locations, two data centers, and over 1,500 users. Excellent background in strategic business operations, technical consulting, infrastructure analysis, vendor management, and contract/purchasing negations as well as hands-on project management. Proven track record for implementing transformational new products/applications/procedures to drive improved business efficiencies, end-user productivity, margins, and revenues. Skilled at creating productive work environments and motivating high-performance technical teams.

Watch On Demand