{"id":5237,"date":"2021-08-23T14:23:02","date_gmt":"2021-08-23T18:23:02","guid":{"rendered":"https:\/\/ptp.cloud\/?p=5237"},"modified":"2025-07-22T20:07:33","modified_gmt":"2025-07-23T00:07:33","slug":"crafting-a-plan-to-combat-ransomware","status":"publish","type":"post","link":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/","title":{"rendered":"Crafting a Plan to Combat Ransomware: Expert Panel with PTP, Carbonite &#038; Fluency"},"content":{"rendered":"[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; da_disable_devices=&#8221;off|off|off&#8221; global_colors_info=&#8221;{}&#8221; da_is_popup=&#8221;off&#8221; da_exit_intent=&#8221;off&#8221; da_has_close=&#8221;on&#8221; da_alt_close=&#8221;off&#8221; da_dark_close=&#8221;off&#8221; da_not_modal=&#8221;on&#8221; da_is_singular=&#8221;off&#8221; da_with_loader=&#8221;off&#8221; da_has_shadow=&#8221;on&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_code _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<article><!-- [et_pb_line_break_holder] -->  <pee><!-- [et_pb_line_break_holder] -->    Originally broadcast Thursday, August 19, 2021, PTP led a panel of experts to discuss crafting a plan to combat ransomware. Moderated by <!-- [et_pb_line_break_holder] -->    <a href=\"https:\/\/www.linkedin.com\/in\/gary-derheim-86439\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gary Derheim<\/a> of PTP, the panel featured <!-- [et_pb_line_break_holder] -->    Chris Jordan of <a href=\"https:\/\/www.fluencysecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fluency Security<\/a>, Adam Johnson and Kirby Kaylor from <!-- [et_pb_line_break_holder] -->    <a href=\"https:\/\/www.carbonite.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Carbonite<\/a>, and Rick Pitcairn of PTP. The panel outlined the evolution of ransomware, emerging threats like Ransomware-as-a-Service, and practical steps to build a living plan to mitigate risk.<!-- [et_pb_line_break_holder] -->  <\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<div style=\"position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden; margin-top: 1.5em;\"><!-- [et_pb_line_break_holder] -->    <iframe<!-- [et_pb_line_break_holder] -->      src=&#8221;https:\/\/www.youtube-nocookie.com\/embed\/zjBSsxwEKIg?rel=0&#8243;<!-- [et_pb_line_break_holder] -->      title=&#8221;Crafting a Plan to Combat Ransomware \u2013 Security Panel by PTP&#8221;<!-- [et_pb_line_break_holder] -->      loading=&#8221;lazy&#8221;<!-- [et_pb_line_break_holder] -->      style=&#8221;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border: 0;&#8221;<!-- [et_pb_line_break_holder] -->      referrerpolicy=&#8221;strict-origin-when-cross-origin&#8221;<!-- [et_pb_line_break_holder] -->      allow=&#8221;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&#8221;<!-- [et_pb_line_break_holder] -->      allowfullscreen><!-- [et_pb_line_break_holder] -->    <\/iframe><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<div style=\"text-align: center; margin: 1.5em 0;\"><!-- [et_pb_line_break_holder] -->    <a href=\"https:\/\/www.youtube.com\/watch?v=zjBSsxwEKIg\" target=\"_blank\" rel=\"noopener noreferrer\" title=\"Watch the full video on YouTube\" style=\"text-decoration: none;\"><!-- [et_pb_line_break_holder] -->      <strong>Watch the full video on YouTube<\/strong><!-- [et_pb_line_break_holder] -->      <img src=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2024\/09\/Youtube-icon-300x300.png\" alt=\"Watch PTP\u2019s ransomware defense panel featuring Carbonite and Fluency Security experts\" width=\"26\" height=\"26\" loading=\"lazy\" decoding=\"async\" style=\"vertical-align: middle; margin-left: 8px;\" \/><!-- [et_pb_line_break_holder] -->    <\/a><!-- [et_pb_line_break_holder] -->  <\/div>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<h2>Notable Facts, Figures, and Trends:<\/h2>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<ul><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>16.2 days<\/strong>: average downtime after a ransomware attack.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>$84,000<\/strong>: average ransom paid; <strong>$41,000<\/strong> median.<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>3,000% increase<\/strong> in remote user targeting.<\/li>\n<p><!-- [et_pb_line_break_holder] -->  <\/ul>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <pee><!-- [et_pb_line_break_holder] -->    Adversaries are increasingly patient, waiting out retention policies to inflict maximum damage. Ransomware variants like TrickBot now operate silently, scanning for valuable data before encrypting files after backups are no longer viable.<!-- [et_pb_line_break_holder] -->  <\/pee><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <\/p>\n<h2>Key Plan Elements from the Panel<\/h2>\n<p><!-- [et_pb_line_break_holder] -->  <\/p>\n<ul><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>Framework First:<\/strong> Use a proven security framework like NIST to guide protection, detection, response, and recovery<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>Inventory Everything:<\/strong> Understand your infrastructure\u2014cloud, endpoints, mobile, and SD-WAN<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>Backup with Six Key Ingredients:<\/strong> Automatic, off-site, immutable, granular, point-in-time capable, and flexible<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>Make It a Living Plan:<\/strong> Continually adapt as new people, tools, and cloud services emerge<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>Stateful Understanding of Data:<\/strong> Use behavioral models to detect anomalies before escalation<\/li>\n<p><!-- [et_pb_line_break_holder] -->    <\/p>\n<li><strong>End-User Awareness:<\/strong> Monthly security training and phishing simulations to improve user posture<\/li>\n<p><!-- [et_pb_line_break_holder] -->  <\/ul>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] -->  <pee><!-- [et_pb_line_break_holder] -->    At PTP, we combine managed detection and response with cloud-native tools and frameworks to help organizations adapt to the evolving cybersecurity landscape. Our approach emphasizes prevention, resilience, and visibility at every layer.<!-- [et_pb_line_break_holder] -->  <\/pee><!-- [et_pb_line_break_holder] --><\/article>\n<p><!-- [et_pb_line_break_holder] --><!-- [et_pb_line_break_holder] --><script type=\"application\/ld+json\"><!-- [et_pb_line_break_holder] -->{<!-- [et_pb_line_break_holder] -->  \"@context\": \"https:\/\/schema.org\",<!-- [et_pb_line_break_holder] -->  \"@type\": \"VideoObject\",<!-- [et_pb_line_break_holder] -->  \"name\": \"Crafting a Plan to Combat Ransomware \u2013 Security Panel by PTP\",<!-- [et_pb_line_break_holder] -->  \"description\": \"Experts from PTP, Carbonite, and Fluency Security outline how to prepare and adapt ransomware defense strategies. From immutable backups to end-user training and real-time behavioral detection, this discussion gives IT leaders an actionable roadmap.\",<!-- [et_pb_line_break_holder] -->  \"thumbnailUrl\": \"https:\/\/i.ytimg.com\/vi\/zjBSsxwEKIg\/maxresdefault.jpg\",<!-- [et_pb_line_break_holder] -->  \"uploadDate\": \"2021-08-19T00:00:00-05:00\",<!-- [et_pb_line_break_holder] -->  \"duration\": \"PT10M47S\",<!-- [et_pb_line_break_holder] -->  \"embedUrl\": \"https:\/\/www.youtube-nocookie.com\/embed\/zjBSsxwEKIg\",<!-- [et_pb_line_break_holder] -->  \"contentUrl\": \"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/\",<!-- [et_pb_line_break_holder] -->  \"publisher\": {<!-- [et_pb_line_break_holder] -->    \"@type\": \"Organization\",<!-- [et_pb_line_break_holder] -->    \"name\": \"PTP\",<!-- [et_pb_line_break_holder] -->    \"logo\": {<!-- [et_pb_line_break_holder] -->      \"@type\": \"ImageObject\",<!-- [et_pb_line_break_holder] -->      \"url\": \"https:\/\/ptp.cloud\/wp-content\/uploads\/2020\/11\/ptp-rebrand-logo-original.png\"<!-- [et_pb_line_break_holder] -->    }<!-- [et_pb_line_break_holder] -->  },<!-- [et_pb_line_break_holder] -->  \"potentialAction\": {<!-- [et_pb_line_break_holder] -->    \"@type\": \"WatchAction\",<!-- [et_pb_line_break_holder] -->    \"target\": \"https:\/\/www.youtube.com\/watch?v=zjBSsxwEKIg\"<!-- [et_pb_line_break_holder] -->  },<!-- [et_pb_line_break_holder] -->  \"interactionStatistic\": {<!-- [et_pb_line_break_holder] -->    \"@type\": \"InteractionCounter\",<!-- [et_pb_line_break_holder] -->    \"interactionType\": { \"@type\": \"WatchAction\" },<!-- [et_pb_line_break_holder] -->    \"userInteractionCount\": 100<!-- [et_pb_line_break_holder] -->  },<!-- [et_pb_line_break_holder] -->  \"inLanguage\": \"en\",<!-- [et_pb_line_break_holder] -->  \"isFamilyFriendly\": true,<!-- [et_pb_line_break_holder] -->  \"genre\": [\"Cybersecurity\", \"Ransomware\", \"IT Strategy\"],<!-- [et_pb_line_break_holder] -->  \"creator\": {<!-- [et_pb_line_break_holder] -->    \"@type\": \"Organization\",<!-- [et_pb_line_break_holder] -->    \"name\": \"PTP\"<!-- [et_pb_line_break_holder] -->  },<!-- [et_pb_line_break_holder] -->  \"about\": [<!-- [et_pb_line_break_holder] -->    \"ransomware planning\",<!-- [et_pb_line_break_holder] -->    \"cybersecurity best practices\",<!-- [et_pb_line_break_holder] -->    \"immutable backup strategy\",<!-- [et_pb_line_break_holder] -->    \"user awareness training\",<!-- [et_pb_line_break_holder] -->    \"NIST security framework\"<!-- [et_pb_line_break_holder] -->  ],<!-- [et_pb_line_break_holder] -->  \"contentLocation\": {<!-- [et_pb_line_break_holder] -->    \"@type\": \"Place\",<!-- [et_pb_line_break_holder] -->    \"name\": \"United States\"<!-- [et_pb_line_break_holder] -->  },<!-- [et_pb_line_break_holder] -->  \"keywords\": \"managed IT services for life sciences, IT services for life sciences, biotech IT support, IT provider for life sciences companies, life sciences compliance, life sciences IT support, managed cloud services for life sciences, life sciences managed IT services, IT support for biotech companies, research IT services for biotech, IT infrastructure for biotech startups, IT support for clinical research, outsourced IT services for life sciences, IT managed services for biotech, managed IT for research labs, research data IT services, IT management for clinical trials, managed IT for labs, IT solutions for regulated research, scientific computing IT support, IT consulting for life sciences, IT services for CROs, managed IT services for labs, IT infrastructure for life sciences companies, IT managed service provider for life sciences, laboratory IT services, secure IT services for biotech, biotech IT services, IT services for biotech labs, managed IT provider for biotech companies, compliant IT services for research labs, HIPAA IT support for biotech, research IT support services, IT consulting for biotech startups, biotech infrastructure support, secure lab IT support, MSP for life sciences, Biotech MSP services, MSP for biotech companies, MSP for genomics research, Scientific research MSP, Clinical research MSP, GxP-compliant MSP, HIPAA-compliant MSP for biotech, MSP services for lab compliance, MSP for research labs, MSP for CROs, MSP for life sciences compliance, Outsourced MSP for biotech, AWS MSP for life sciences, MSP services for biotech\",<!-- [et_pb_line_break_holder] -->  \"transcript\": \"This expert panel hosted by PTP features security leaders from Carbonite and Fluency Security exploring how to design, evolve, and maintain a ransomware response plan. They discuss the shift in ransomware tactics, including Ransomware-as-a-Service, TrickBot behavior, and remote user exploitation. Attendees learn why immutable backups, inventory visibility, and behavioral analytics are critical. The panel walks through NIST-based frameworks, how to develop a living plan, and why end-user awareness training is essential. Real-world ransomware trends and data points anchor the conversation, making this a practical session for IT leaders in healthcare, biotech, and research.\"<!-- [et_pb_line_break_holder] -->}<!-- [et_pb_line_break_holder] --><\/script><!-- [et_pb_line_break_holder] -->[\/et_pb_code][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; background_color=&#8221;#f2f2f2&#8243; custom_margin=&#8221;27px|auto||auto||&#8221; custom_padding=&#8221;18px|18px|18px|18px|true|true&#8221; border_radii=&#8221;on|5px|5px|5px|5px&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]\n<p data-start=\"2673\" data-end=\"2884\"><strong data-start=\"66\" data-end=\"113\">Strengthen your defenses against ransomware<\/strong><br data-start=\"113\" data-end=\"116\" \/>Get 50% off a security risk assessment and uncover vulnerabilities before attackers do.<\/p>\n[\/et_pb_text][dsm_button button_one_text=&#8221;\ud83d\udc49 Claim your 50% off security assessment&#8221; button_one_url=&#8221;https:\/\/ptp.cloud\/services\/secops\/security-risk-assessment\/&#8221; button_two_text=&#8221;\ud83d\udc49 PTP&#8217;s AWS Marketplace Offers&#8221; button_two_url=&#8221;https:\/\/aws.amazon.com\/marketplace\/seller-profile?id=40aef862-90e2-4a5f-9d98-2ef74b6cbf15&#8243; button_alignment=&#8221;left&#8221; separator_text=&#8221;or explore&#8221; _builder_version=&#8221;4.27.4&#8243; _module_preset=&#8221;default&#8221; custom_button_one=&#8221;on&#8221; button_one_text_size=&#8221;14px&#8221; button_one_text_color=&#8221;#ffffff&#8221; button_one_bg_color=&#8221;#0eabf4&#8243; button_one_border_width=&#8221;0px&#8221; button_one_border_radius=&#8221;3px&#8221; button_one_font=&#8221;|600|||||||&#8221; button_one_use_icon=&#8221;off&#8221; button_one_custom_margin=&#8221;|11px|||false|false&#8221; custom_button_two=&#8221;on&#8221; button_two_text_size=&#8221;14px&#8221; button_two_text_color=&#8221;#ffffff&#8221; button_two_bg_color=&#8221;#0eabf4&#8243; button_two_border_width=&#8221;0px&#8221; button_two_border_radius=&#8221;3px&#8221; button_two_font=&#8221;|600|||||||&#8221; button_two_use_icon=&#8221;off&#8221; custom_margin=&#8221;|||0px|false|false&#8221; box_shadow_style_button_one=&#8221;preset2&#8243; box_shadow_style_button_two=&#8221;preset2&#8243; box_shadow_blur_button_two=&#8221;19px&#8221; global_colors_info=&#8221;{}&#8221;][\/dsm_button][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n<span class=\"et_bloom_bottom_trigger\"><\/span>","protected":false},"excerpt":{"rendered":"<p>Ransomware threats are evolving\u2014and so should your strategy. In this expert panel, PTP, Carbonite, and Fluency Security explore how to craft and maintain a living plan using real-world frameworks and proactive security tactics.<\/p>\n","protected":false},"author":2,"featured_media":11573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"Originally broadcast Thursday, August 19, 2021, PTP led a panel of experts to discuss Crafting a Plan to Combat Ransomware. \u00a0Moderated by Gary Derheim of PTP, the panel included Chris Jordan of Fluency Security, Adam Johnson and Kirby Kaylor from Carbonite, and Rick Pitcairn of PTP. \u00a0The panelists outlined the rise of ransomware, the new methods and variants, such as Ransomware as a Service and then outlined the logical steps to create a living plan to mitigate the risk. \u00a0Watch the HIGHLIGHTs of the panel discussion below!\r\n<h4>Notable Facts, Figures and Comments on Ransomware<\/h4>\r\n<ul>\r\n \t<li>In the last 2 years, the average downtime from ransomware has been 16.2 days and the average ransom paid has been $84,000.<\/li>\r\n \t<li>Home (remote) user targets are up over 3,000%.<\/li>\r\n \t<li>Our adversaries are patient, waiting until retention policies have passed to create maximum opportunity for damage and ransom.<\/li>\r\n \t<li>Plan Elements\r\n<ul>\r\n \t<li>Leverage an industry security framework such as <a href=\"https:\/\/www.nist.gov\">NIST<\/a><\/li>\r\n \t<li>Inventory of Information, Data and Environment<\/li>\r\n \t<li>Leverage Endpoint Detection and Response (EDR) technology for user behavioral analysis<\/li>\r\n \t<li>6 Step Data Backup\r\n<ul>\r\n \t<li>Automatic<\/li>\r\n \t<li>Off-site<\/li>\r\n \t<li>Immutable (cannot be changed)<\/li>\r\n \t<li>Granular policies<\/li>\r\n \t<li>\u00a0Point in Time<\/li>\r\n \t<li>Flexible<\/li>\r\n<\/ul>\r\n<\/li>\r\n \t<li>Iterative, living plan always adapting to current and future threats<\/li>\r\n \t<li>End-User Awareness training<\/li>\r\n \t<li>Vulnerability Management<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n\u00a0\r\n\r\n[embed]https:\/\/youtu.be\/zjBSsxwEKIg[\/embed]\r\n\r\n\u00a0\r\n<h3><\/h3>\r\n<h3>Click <a href=\"https:\/\/ptp.cloud\/managed-security\/\">HERE<\/a> for PTP's Managed Security Services<\/h3>\r\n<h3>Click <a href=\"https:\/\/www.youtube.com\/channel\/UCvKlMvtFzLVaT_vlaXnvMIQ\">HERE<\/a> for PTP's YouTube Channel of Learning Videos<\/h3>\r\n\u00a0\r\n\r\n\u00a0","_et_gb_content_width":"","content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[189,83,10],"tags":[94,95,96,93],"table_tags":[],"class_list":["post-5237","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-archive","category-learning-videos-archive","category-secops-archive","tag-cloud-security","tag-managed-security","tag-mssp","tag-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.1.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware Planning Panel \u2013 PTP, Carbonite &amp; Fluency<\/title>\n<meta name=\"description\" content=\"Learn how experts from PTP, Carbonite, and Fluency build ransomware response plans using NIST frameworks, immutable backups, and user training.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Planning Panel \u2013 PTP, Carbonite &amp; Fluency\" \/>\n<meta property=\"og:description\" content=\"Learn how experts from PTP, Carbonite, and Fluency build ransomware response plans using NIST frameworks, immutable backups, and user training.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"PTP | Cloud Experts | Biotech Enablers\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PTPCloud\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-23T18:23:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-23T00:07:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gary Derheim\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:site\" content=\"@PTPCloud\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gary Derheim\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/\"},\"author\":{\"name\":\"Gary Derheim\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab\"},\"headline\":\"Crafting a Plan to Combat Ransomware: Expert Panel with PTP, Carbonite &#038; Fluency\",\"datePublished\":\"2021-08-23T18:23:02+00:00\",\"dateModified\":\"2025-07-23T00:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/\"},\"wordCount\":662,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg\",\"keywords\":[\"cloud security\",\"managed security\",\"mssp\",\"ransomware\"],\"articleSection\":[\"Blog\",\"Learning Videos\",\"SecOps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/\",\"url\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/\",\"name\":\"Ransomware Planning Panel \u2013 PTP, Carbonite & Fluency\",\"isPartOf\":{\"@id\":\"https:\/\/ptp.cloud\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg\",\"datePublished\":\"2021-08-23T18:23:02+00:00\",\"dateModified\":\"2025-07-23T00:07:33+00:00\",\"description\":\"Learn how experts from PTP, Carbonite, and Fluency build ransomware response plans using NIST frameworks, immutable backups, and user training.\",\"breadcrumb\":{\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#primaryimage\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg\",\"width\":1080,\"height\":576,\"caption\":\"Webinar Highlight: Crafting a Plan to Combat Ransomware - Expert insights into the latest ransomware threats and prevention strategies.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ptp.cloud\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crafting a Plan to Combat Ransomware: Expert Panel with PTP, Carbonite &#038; Fluency\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ptp.cloud\/#website\",\"url\":\"https:\/\/ptp.cloud\/\",\"name\":\"PTP | Cloud Experts | Biotech Enablers\",\"description\":\"Helping innovative life sciences companies to get treatments to market faster.\",\"publisher\":{\"@id\":\"https:\/\/ptp.cloud\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ptp.cloud\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ptp.cloud\/#organization\",\"name\":\"Pinnacle Technology Partners\",\"alternateName\":\"PTP\",\"url\":\"https:\/\/ptp.cloud\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"contentUrl\":\"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png\",\"width\":409,\"height\":181,\"caption\":\"Pinnacle Technology Partners\"},\"image\":{\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PTPCloud\",\"https:\/\/x.com\/PTPCloud\",\"https:\/\/www.linkedin.com\/company\/pinnacletechpartners\",\"https:\/\/www.youtube.com\/@ptp4766\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab\",\"name\":\"Gary Derheim\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Planning Panel \u2013 PTP, Carbonite & Fluency","description":"Learn how experts from PTP, Carbonite, and Fluency build ransomware response plans using NIST frameworks, immutable backups, and user training.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Planning Panel \u2013 PTP, Carbonite & Fluency","og_description":"Learn how experts from PTP, Carbonite, and Fluency build ransomware response plans using NIST frameworks, immutable backups, and user training.","og_url":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/","og_site_name":"PTP | Cloud Experts | Biotech Enablers","article_publisher":"https:\/\/www.facebook.com\/PTPCloud","article_published_time":"2021-08-23T18:23:02+00:00","article_modified_time":"2025-07-23T00:07:33+00:00","og_image":[{"width":1080,"height":576,"url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg","type":"image\/jpeg"}],"author":"Gary Derheim","twitter_card":"summary_large_image","twitter_creator":"@PTPCloud","twitter_site":"@PTPCloud","twitter_misc":{"Written by":"Gary Derheim","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#article","isPartOf":{"@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/"},"author":{"name":"Gary Derheim","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab"},"headline":"Crafting a Plan to Combat Ransomware: Expert Panel with PTP, Carbonite &#038; Fluency","datePublished":"2021-08-23T18:23:02+00:00","dateModified":"2025-07-23T00:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/"},"wordCount":662,"commentCount":0,"publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"image":{"@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg","keywords":["cloud security","managed security","mssp","ransomware"],"articleSection":["Blog","Learning Videos","SecOps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/","url":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/","name":"Ransomware Planning Panel \u2013 PTP, Carbonite & Fluency","isPartOf":{"@id":"https:\/\/ptp.cloud\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg","datePublished":"2021-08-23T18:23:02+00:00","dateModified":"2025-07-23T00:07:33+00:00","description":"Learn how experts from PTP, Carbonite, and Fluency build ransomware response plans using NIST frameworks, immutable backups, and user training.","breadcrumb":{"@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#primaryimage","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg","width":1080,"height":576,"caption":"Webinar Highlight: Crafting a Plan to Combat Ransomware - Expert insights into the latest ransomware threats and prevention strategies."},{"@type":"BreadcrumbList","@id":"https:\/\/ptp.cloud\/crafting-a-plan-to-combat-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ptp.cloud\/"},{"@type":"ListItem","position":2,"name":"Crafting a Plan to Combat Ransomware: Expert Panel with PTP, Carbonite &#038; Fluency"}]},{"@type":"WebSite","@id":"https:\/\/ptp.cloud\/#website","url":"https:\/\/ptp.cloud\/","name":"PTP | Cloud Experts | Biotech Enablers","description":"Helping innovative life sciences companies to get treatments to market faster.","publisher":{"@id":"https:\/\/ptp.cloud\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ptp.cloud\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ptp.cloud\/#organization","name":"Pinnacle Technology Partners","alternateName":"PTP","url":"https:\/\/ptp.cloud\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/","url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","contentUrl":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/ptp_logo.png","width":409,"height":181,"caption":"Pinnacle Technology Partners"},"image":{"@id":"https:\/\/ptp.cloud\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PTPCloud","https:\/\/x.com\/PTPCloud","https:\/\/www.linkedin.com\/company\/pinnacletechpartners","https:\/\/www.youtube.com\/@ptp4766"]},{"@type":"Person","@id":"https:\/\/ptp.cloud\/#\/schema\/person\/9164cae6fb27fb76f79e048d8dd2d8ab","name":"Gary Derheim"}]}},"jetpack_featured_media_url":"https:\/\/ptp.cloud\/wp-content\/uploads\/2021\/08\/Crafting-a-Plan-to-Combat-Ransomware.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/5237","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/comments?post=5237"}],"version-history":[{"count":8,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/5237\/revisions"}],"predecessor-version":[{"id":17963,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/posts\/5237\/revisions\/17963"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media\/11573"}],"wp:attachment":[{"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/media?parent=5237"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/categories?post=5237"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/tags?post=5237"},{"taxonomy":"table_tags","embeddable":true,"href":"https:\/\/ptp.cloud\/wp-json\/wp\/v2\/table_tags?post=5237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}