risk Archives - Security IT Summit | Forum Events Ltd
Posts Tagged :


WEBINAR: Live Attack Simulation – Ransomware

553 289 Guest Post

Wednesday, March 24th @10:00 GMT

If you’re concerned about ransomware, whether it’s beating Ryuk, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you.  Join Cybereason for a live attack simulation, where we’ll discuss the latest ransomware trends, walk through a multi-stage attack, and show the side by side Defenders view. 

Beating modern ransomware attacks means not only preventing the ransomware from running, but finding and stopping the malicious behaviors that come before it. Our Nocturnus team researches every major strain of ransomware to continually improve our multi-layer prevention and our behavioural approach to threat detection with the Malop.

See our latest findings and why Cybereason arms you with fearless protection against ransomware to reduce risk across your enterprise.

Join us to learn:

– Why ransomware continues to evolve and common delivery methods 

– How ransomware is used as the “last step” in kill chains 

– See tactics and techniques used by FIN6 & UNC threat actors

Register today

Risk-based approach needed to stop cyber crime

960 640 Stuart O'Brien

A report by Gartner has advised companies to take a risk-based approach to stop cyber crime, rather than trying to prevent attacks with large-scale, expensive security deployments.

A survey commissioned by Gartner of 3,160 CIOs across 98 countries and various major industries showed that 35% had already invested in a form of digital security at their company, with 36% admitting that they were planning to activate digital security at their company in the short term.

Discussing the findings, Rob McMillan, research director at Gartner, said: “Raising budgets alone doesn’t create an improved risk posture.

“Security investments must be prioritised by business outcomes to ensure the right amount is spent on the right things.”

McMillan advised companies to take a risk-based approach, with businesses continuously changing plans and security techniques as and when necessary.

“Taking a risk-based approach is imperative to set a target level of cybersecurity readiness,” added MacMillan.

“In a twisted way, many cybercriminals are digital pioneers, finding ways to leverage big data and web-scale techniques to stage attacks and steal data.

”CIOs can’t protect their organisations from everything, so they need to create a sustainable set of controls that balances their need to protect their business with their need to run it.”