Responding to Ransomware
Technology Leaders Dinner and Discussion 4th July 2025
Key Points of Discussion include:
- Isolate infected systems and activate your incident response plan immediately.
- Preserve evidence, assess the attack’s scope, and engage cybersecurity experts.
- Communicate with leadership, legal teams, and report to authorities as required.
- Carefully evaluate ransom demands and prioritize restoring from clean backups.
- Strengthen defences post-incident by patching vulnerabilities and retraining staff.