Resource Center


Investigate Malware & Ransomware with Speed and Efficiency

It’s not a question of if a data breach will happen, but when. According to Verizon’s Data Breach Investigations Report: system intrusions or data breaches typically involve numerous steps and the majority of these attacks involve Malware (70%), usually of the Ransomware variety Investigation of these breaches and obtaining Indicators of Compromise quickly is paramount to prevent further infections throughout a network.

Join Magnet Forensics’ Steve Gemperle, currently Forensic Consultant—and former Senior Special Agent with the United States Secret Service specializing in cybercrime—as he talks about how you can quickly and effectively investigate Malware and Ransomware events. This presentation will focus on connecting the dots in examining the malware and its related components, looking for sideloaded dll’s and identifying outbound communications. We will also look at the use of timeline to assist in identifying the compromise.


After viewing this webinar, you can download a certificate of completion from the event console. 

View the Webinar

Holo, transparent letter M

Subscribe today to hear directly from Magnet Forensics on the latest product updates, industry trends, and company news.

Start modernizing your digital investigations today.

Ready to explore on your own? Start a Free Trial