There are three components of an information security strategy: the things you’re required to do by law; the operational processes and procedures you put into place; and the technology tools you use to get the job done. Tonight’s episode is about ransomware generally and Cryptolocker specifically. We just touched on it during episode 3 entitled: “There’s a New Outlaw in Town…Cryptolocker”. Ed Brzozowski will be joining us later for some discussion on the subject.
Tonight we are going to share a couple of emails with you. We have gotten nothing but positive feedback from you so far. Also there is an IT Conference called Brainstorm 15.0 that is going to be held at the Kalahari Convention Center in Wisconsin Dells. I went there a couple of years ago and brought so much back…….I just can’t even describe it to you. That is also where I first met Jeremy Moskowitz a Group Policy expert and a Microsoft MVP.