Conceal to Host Worldwide Movie Premier of Ransom at Black Hat USA 2022 

[ This article was originally published here ]

AUGUSTA, Ga.–()–, the leader in Zero Trust isolation technology, today announced that it will host the world premiere of Ransom at Black Hat USA 2022, a movie based on true events that follows the rise of a female kingpin in the global underground of Ransomware-as-a-Service crime syndicates.

WHO:

Ransom was produced by Knight Studios, co-produced by Conceal and directed by award-winning filmmaker Alissa Valentina Knight (Cannes Independent Film Festival Selection).

 

WHAT:

The movie chronicles the life of Widow, the female kingpin of a ransomware-as-a-service crime syndicate, as her group rises to power in the global underground economy. The Hollywood-style premier and cocktail event will provide the opportunity to meet the cast and producers, who will be signing official movie posters. The screening will be followed by a special CISO panel discussion on the new film featuring:

 

, CISO, Florida Crystals and 2019 Cyber Woman Leader of the Year

, CISO, IPG and Best Selling Author

, Director, Executive Producer, Knight Studios

, CEO, Conceal

 

WHERE:

AMC Town Square 18 – 6587 S Las Vegas Blvd., Las Vegas, NV 89119

 

WHEN:

Monday, August 8, 2022 from 8:00pm – 11:00pm (PDT)

 

HOW: 

To register for the event visit:

About Conceal

Conceal enables organizations to protect users from malware and ransomware at the edge. The Conceal Platform uses Zero Trust isolation technology to defend against sophisticated cyber threats. Conceal is used by Fortune 500 and government organizations globally to ensure their users and IT operations remain secure, anonymous and isolated from attacks. For more information, visit .

 

 

Ad

Tags:
Previous Post
Business Cyber Security Cybercrime Learn Guide Marketing

Comcast Business Partners with Fortinet to Secure Enterprise Application Access with New SASE and SSE Solutions

Next Post
Business Cyber Security Cybercrime How to Tips Learn Guide Resources

Credential harvesting: Is it too big of an attack or can you fight back?

Leave a Reply

Your email address will not be published.