ThinkGard Ransomware Roadshow Lunch 'n Learns

Roadshow attendees BHM

"Even though I wasn’t in the market for data protection, I left the event with some great ideas to take back to my team and had the pleasure of networking with like-minded folks!”

– ThinkGard Roadshow Attendee

Encrypted & Exfiltrated
The Worst Case Scenario

Their network had been infiltrated by bad actors who then exfiltrated approximately a 1/2 a TB of sensitive client and employee data just before encrypting all the machines on their network with ransomware. The exfiltrated data was subsequently released to the dark web where it was located by a cyber security website who wrote an article about it!  This situation is just about as bad as you can imagine. Our presentation is a deep-dive case study of what happened, how it happened, how it could have been prevented and how they ultimately recovered, complete with timelines, screenshots from the hackers, info from the ISP, and more. The twists and turns in this story are incredible. You don’t want to miss this!


  • Gain a better understanding of the complex and dynamic nature of the current cybersecurity landscape.
  • Understand how to develop a more hardened approach within your organization to better protect your organization from breaches.
  • Learn how bad actors are able to take advantage of the smallest vulnerabilities to move laterally within your IT Security and gain access to your most sensitive systems.

Seating is limited!

Franklin, Tennessee

Event Venue:
Perry's Steakhouse
Tuesday, August 17th, 2021

Dallas (Plano) Texas

Event Venue
Flemings Steakhouse
Tuesday, September 28, 2021


Event Venue
Flemings Steakhouse
Wednesday, September 29, 2021

Alpharetta, Georgia

Event Venue:
Ruth's Chris Steakhouse
Tuesday, September 26th, 2021

Chattanooga, Tennessee

Event Venue:
Ruth's Chris Steakhouse
Tuesday, October 27th, 2021

Space is limited. Reserve Early!

This invitation is exclusively for IT professionals and business leaders who are concerned about protecting their company’s most valuable asset from ransomware hackers and protecting them from downtime.

We've expanded this presentation to include another similar event where we will play the recording we've obtained of the hacker contacting the IT Director for payment and we'll also discuss the hows and whys of the Colonial Pipeline incident too. You don’t want to miss this!

Scroll to Top