Cybersecurity experts Daniel Chew and Art Taryan will demystify ransomware and explain the scary details of how cyberattacks breach schools and districts. You will learn how to be ready when hackers strike.
What You'll Learn
- Ransomware definition and overview
- Typical targets of attacks
- Case studies of effects on other organizations and lessons learned
- Threat intelligence overview and benefits
- Fundamentals of a threat intelligence implementation
- Lifecycle to reduce threats
Training Overview
Ransomware struck LA Unified last weekend. Learn how to keep your district’s systems and data safe.
On September 3, Los Angeles Unified School District discovered a ransomware attack that “temporarily disabled systems, froze others and had access to some degree of data.” If the second largest district in the country could fall victim to such an attack, yours could easily be next. Hackers are aggressively pursuing schools, recognizing the potential for fast payouts and access to troves of valuable data.
According to the Los Angeles Times, “District staff recognized the breach quickly and took fast action that may have averted an operational disaster.” You need similar tools and processes to identify and mitigate attacks on your systems.
You cannot afford to allow ransomware to infect your school or district. High removal costs, system downtime, and leaks of confidential information will hurt your students, staff, and reputation. On top of that, you may pay a hefty ransom, fueling the unscrupulous attackers and stealing money from education. It is not sufficient to leave the response to information technology staff—all district and site leaders must be knowledgeable, responsive, and involved to prevent attacks and limit their spread.
We have assembled a series of two on-demand training sessions packed with information will help you prepare for a cyberattack, know how to respond, and keep your school safe:
Two-Part Series: Cybersecurity Threat Mitigation (Ransomware And Threat Modeling)
Session 1: Understanding And Defending Against A Ransomware Attack
- Ransomware definition and overview
- Typical targets of attacks
- Case studies of effects on other organizations and lessons learned
- Tactics to build resiliency
- Steps to take immediately to protect data
- Protocols for responding to a ransomware attack
Session 2: Threat Intelligence And Threat Modeling For Risk Mitigation
- Threat intelligence overview and benefits
- Fundamentals of a threat intelligence implementation
- Lifecycle to reduce threats
- Benefits and techniques for threat modeling
Who Should Attend?
|
|
Expert Presenters


- 14 years of experience in risk/threat and project management within multiple Fortune 500 companies and the US military
- Focuses on cyber threat intelligence, threat modeling, insider threat, incident response, and counter fraud
- Leads the threat intelligence efforts within Cross Country Consulting’s Cyber & Privacy group
- Previously an Army officer, including supporting real-world defensive and offensive cyber operations alongside the NSA


- Associate Director at CrossCountry Consulting
- Over 15 years of experience as an information technology and cybersecurity consultant
- Works with clients in financial services, public infrastructure, hospitality, healthcare, and other industries
- Specializes in offensive and defensive cybersecurity, including architecting security solutions around penetration testing, incident response, and cyber defense
CareerLearning Quality Commitment
CareerLearning wants you to be satisfied with your purchase. If this program does not meet your expectations, email us at support@careerlearning.com.