The webinar either no longer exists or an error has occured.
Tricky Methods Threat-Actors Use to Destroy Backups, and How to Stop Them

**Please make sure that you register using a valid work email address only**