
We are pleased to announce that Eng.
Enrico Tonello, IT Security Researcher & Co-founder of TG Soft Cyber Security Specialist, has been invited by
MUSA Training to participate as a speaker in the
IT Security Workshop: How Ransomware Is Intercepted and Blocked, which will take place:

The free seminar entitled "IT Security Workshop:
How Ransomware is INTERCEPTED and BLOCKED" is organized by
MUSA Training in collaboration with
TG Soft Cyber Security Specialist and
AIPSI (
Italian Association of Information Security Professionals).
This is an in-depth technical and practical workshop in which trainees will have the opportunity to witness a real-life ransomware attack using a recent and truly circulating sample that will show a typical
#CyberHumanOperatedRansomwareAttacks, live in the 3 modes
:
- WITHOUT PROTECTION
- WITH BEHAVIORAL HEURISTIC PROTECTION on the SERVER where the attack will be initiated by the #CyberCriminal from a CLIENT that is not properly protected and finally...
- WITH BEHAVIOURAL HEURISTIC PROTECTION on both the SERVER and the CLIENT.
The course/seminar is FREE and aimed at all enthusiasts, experts, aspiring ethical hackers and anyone who feels like it, with the purpose of delving into an increasingly topical threat RANSOMWARE and discovering how they have evolved and how they are intercepted and blocked.
We would like to thank the organizers,
MUSA Training and in particular
Dr. Massimo Chirivì (Senior Trainer Musa Training) for inviting
TG Soft Cyber Security Specialist to the realization of the Seminar with the intrervention of
Eng. Enrico Tonello as the speaker of the event.
Abstract
A FREE and PRACTICAL 2-hour meeting that will take you into the world of Ransomware. Specifically, the following topics will be covered during the Seminar/Workshop:
- What ransomware is and its classification;
- How it has evolved from 2010 to the present
- Ransomware aka current Crypto-Malware
- The main methods of diffusion/attack
- How we Can / MUST Defend Against Ransomware - Crypto-Malware
- Attack without specific heuristic behavioral technologies on "naked" machine with original equipment AV
- Attack with behavioural heuristic technologies built into Vir.IT eXplorer PRO active only on Server machine with shared folder
- Attack with behavioural heuristic technologies built into Vir.IT eXplorer PRO active on both the Server and Client machine
- Conclusions on the effectiveness and efficiency of these technologies and the response time regarding an attack of this nature;
- Q&A Session with Experts
The speaker Eng. Enrico Tonello
 |
- Eng. Enrico Tonello IT Security Researcher & Co-Author of Vir.IT eXplorer, co-founder of TG Soft Cyber Security Specialist
- Engineering graduate in Padua, Italy. Since 1990 attentive to computer security aspects and in particular virus&malware attacks.
- Author of many articles on computer viruses&malware published in some of the leading Italian magazines in the field.
|
Assisted for the technical demonstration by:
Michele Zuin
- IT expert, senior systems engineer.
- Researcher & Analyst of Malware, Ransomware and Cyber Attacks.
- Technical customer support coordinator of TG Soft Cyber Security Specialist.
TG Soft
External Relations