Get Started
Loading Events
This event has passed.

In this scenario, an unsuspecting employee opens a legitimate looking email from a trusted source with an attached document and the ominous message demands for the transfer of bitcoin to unlock their system. Within minutes of opening the attachment, the user’s system has been compromised. Participants must contain the incident and learn proper handling and response techniques in order to solve the case and save the organization from complete lockdown.

Share This Story, Choose Your Platform!

Go to Top