All Events and Webinars

Ransomware Cyber Attack Simulation Webinar

Technology and Software
October 13, 2021
Most ransomware attacks don’t start with encryption, they unfold quietly across multiple stages before anyone notices. This simulation walks through a real-world attack chain, showing how attackers use fileless techniques and legitimate tools to stay hidden. Viewers will see how modern detection and response can identify, correlate, and stop these threats before they reach full impact.

In-House Specialists

Raluca Saceanu

Chief Executive Officer
View speaker profile

Featured Guest Speakers

Pavel Mucha

Principal Consultant

Key Strategic Takeaways

Modern Attacks Are Multi-Stage and Designed to Stay Invisible
Legitimate Tools Are the Attacker’s Best Cover
Correlating Events Into Attack Narratives Reduces Detection Time
Rapid, Controlled Response Prevents Escalation Without Disruption
Simulations Expose Gaps Before Real Attacks Do
  • 00:00 Intro + context (recent major cyber incidents)
  • 03:05 Cybereason overview (endpoint + AI positioning)
  • 06:06 Attack scenario setup (attacker / victim / defender)
  • 07:13 Phishing entry point (macro-enabled Excel)
  • 17:19 Initial compromise (DGA + fileless execution)
  • 20:40 Detection model explanation (MalOps vs alerts)
  • 33:50 Response actions (kill process, isolate, guided response)
  • 36:17 Attack escalation (privilege escalation + persistence)
  • 41:52 Lateral movement (pass-the-hash to CEO machine)
  • 44:55 Ransomware deployment (PowerShell-based)
  • 46:12 Detection across attack chain
  • 50:28 Attack tree + full visibility walkthrough
  • 52:53 Threat hunting (query-based detection)
  • 56:30 Platform summary + Q&A
Watch More
No items found.

Ready to scale your security and compliance operations?

We protect your on-premise/cloud/OT environments - 24x7x365