Are you prepared for a Ransomware Attack?
Ransomware and business email compromise attacks can have a catastrophic impact on your business. These incidents are increasing in their sophistication and frequency. In fact, ransomware incidents alone increased by nearly 500% last year. Business email compromise threats have transitioned from the basements of annoying hackers to well-organized and sophisticated criminal enterprises that are engaged in W-2 theft scams, accounts payable fraud, and increasingly nasty ransomware variants. The business impact can be serious: business interruption, regulatory and legal ramifications, and reputational harm. Join the experts at 4Discovery as we explore these alarming trends and discuss best practices for preparing for and responding to ransomware attacks.
Speaker: Chad Gough, CISSP, EnCE, has over ten years of experience in all aspects of computer forensics and electronic discovery cases, including: forensic imaging, analysis, production for litigation support environments, affidavits, and declarations.
Chad has been retained as an expert in cases involving: trade secret theft, intellectual property misappropriation, corporate espionage, fraud/embezzlement, insider trading, software piracy, and employee misconduct. Chad’s consulting and expert witness testimonies have led to the convictions and settlements in numerous cases involving disputes over digital evidence and electronic data.
In addition to Chad's computer forensics and electronic discovery work, he possesses six years of information security experience at a Fortune 500 company, where he personally conducted over 200 forensic cases.
Chad is a frequent speaker on computer forensics and electronic discovery topics. He conducts Continuing Legal Education (CLE) presentations and has spoken at various professional organizations for attorneys, litigation support professionals, and corporate General Counsels. He currently teaches courses in Computer Security and Forensic Investigation program at DePaul University, focusing on internet vulnerabilities, criminal activity, and investigative procedures.