.


›››

peosc

 

Seminar Series

PEOSC is organizing a seminar as part of its goal to help members to achieve a better career through seminars.

TOPICRansomware Attacking and Defending Real Story with Security Best Practices

PRESENTER:  John Li

WHERE:  Zoom Video Conferencing. The zoom link will be provided to the persons who registered to the Seminar

WHEN:  Wednesday, September 29, 2021, from 5:45 pm to 7:00 pm

REGISTRATION DEADLINE:  September 27, 2021 at noon

REGISTRATION:  Follow the Link

Agenda

5:45 pm   Connect to video conference

6:00 pm   Welcome Message

6:05 pm   Introduction

6:10 pm  Presentation

6:50 pm   Questions Period

7:00 pm   Vote of Thanks and Conclusion


ABOUT THE PRESENTER:


John Li is the co-founder of More Secure Computing, a CanadJohn Liian IT Service Provider for over a decade. He led the design and implementation of Canada's most widely used online service infrastructure from Canada Post/epost a little while ago, he also successfully built cutting-edge solutions for the client base such as government agencies, banks, critical service providers, and SMB for more than 20 years. Security is a natural consideration for him and that's getting reinforced as we rely on digital transformation more than ever before.

 

John got his CISSP (Certified Info Systems Security Professional) in 2001, and he got his master's degree in computer science with research on Neural Network Computing.

 


Synopsis of the Topic:  The seminar will cover the following topics:

Ransomware is an ever-growing threat to millions of businesses and individuals worldwide. A 40 million USD ransom has been paid in a recent case. Near half of the victims with business paid the ransom to try to get their data back and the real impact to the business is far more than that.

 

In this session, we will go through a real customer story of ransomware attacking and defending. Along the journey of ransomware defending, we will also look into some of the tech buzzwords and why they did not stop the ransomware from spreading. In the end, we will give out tips for securing your business with efficient and cost-effective security best practices.