Topics covered include:

  • Different RaaS offerings and the tactics, techniques, and procedures (TTPs) employed
  • Current extortion schemes to look out for
  • Why every ransomware attack is a third-party attack