Webinar Archives - Security IT Summit | Forum Events Ltd
  • Covid-19 – click here for the latest updates from Forum Events & Media Group Ltd

Security IT Summit Security IT Summit Security IT Summit Security IT Summit Security IT Summit

Posts Tagged :

Webinar

WEBINAR: Ransomware Has Evolved, And So Should Your Company

960 640 Guest Post

By Veriato

2021 Has been an interesting year for Ransomware attacks so far. After plaguing countless victims with dreaded ransom notes and bringing the US Colonial Pipeline and other large corporations to their knees, the Ransomware attack method has built a strong reputation for inflicting cyber terror on consumers and businesses alike.

As cyber criminals noticed increasing success from this method, the trends shifted towards more targeted enterprise attacks with potentially more lucrative payouts. Furthermore, criminals saw the growing demands for these attacks on the Dark Web as a business opportunity to make attack kits more easily accessible. This new realm of service would essentially remove the burden of coding and crafting attacks from the criminals, thus reducing the difficulty of launching these types of attacks. What once required tons of planning and preparation could now be purchased as a subscription or service.

What is Ransomware?

Also termed digital extortionRansomware is a form of cyberattack in which criminals block access to prized digital possessions or resources and demand payment for their release. There are many variations of ransomware attacks, but the common goal is usually to extort companies or users for money. For example, an attacker may encrypt all of your data and ask for payment in exchange for the decryption key. Without the key, your operations could end up being crippled.

One of the biggest trends in technology over the last decade has been the growth of subscription-based service models and products. Examples include Software as a Service (SaaS), Platform as a Service (PaaS, Infrastructure as a Service (IaaS), and more. Instead of building software or installing software directly in corporate environments, these companies are providing customers with the ability to effectively rent access to the services they need without dealing with development, maintenance, and additional back-end work. Given the high demand for Ransomware in this day and age, creative cyber-criminal entrepreneurs followed this tech industry trend and created Ransomware as a service (RaaS) to ease the burden of cyber attackers having to develop their own attacks.

Using these services, cybercriminals can launch advanced Ransomware attacks using RaaS providers from the Dark Web. 

Sign up for our latest webinar to learn moreRansomware Has Evolved, And So Should Your Company.

WEBINAR REWIND: Overcoming The Challenges Of Selecting An Insider Threat Detection Tool

960 640 Stuart O'Brien

Don’t worry if you missed last week’s insider threat webinar from Veriato – You can now re-watch the entire session online!

In a crowded market with so many new products being released, it can often be hard to make sure you’re getting the right tool for your organization’s security needs. Purchasing an Insider Threat Detection tool for your organization requires extensive research, which can be very time-consuming.

In the webinar, Veriato cleans up some of the noise in the industry together with experts Jim Henderson from the Insider Threat Defense Group and Dr. Christine Izuakor from CyberPopUp. In the webinar, they discuss:

  • Cutting through the hype to see what a product can really do – is it all just marketing fluff?
  • To AI or not to AI – Machine Learning Vs Statistical Analysis
  • Core requirements for Insider Threat Detection solutions – Private Sector Vs Government considerations

Click Here To Watch Again Now

WEBINAR: Overcoming The Challenges Of Selecting An Insider Threat Detection Tool

960 640 Guest Post

By Veriato

In a crowded market with so many new products being released, it can often be hard to make sure you’re getting the right tool for your organization’s security needs. Purchasing an Insider Threat Detection tool for your organization requires extensive research, which can be very time-consuming.

In our latest webinar, we try and clean up some of the noise in the industry together with experts Jim Henderson from the Insider Threat Defense Group and Dr. Christine Izuakor from CyberPopUp. In this webinar, we’ll discuss:

  • Cutting through the hype to see what a product can really do – is it all just marketing fluff?
  • To AI or not to AI – Machine Learning Vs Statistical Analysis
  • Core requirements for Insider Threat Detection solutions – Private Sector Vs Government considerations

Sign up now to learn more!

WEBINAR REWIND: Solorigate/SUNBURST – Chronology of a supply chain nightmare

960 640 Stuart O'Brien

Don’t worry if you missed last week’s essential webinar from SentinelOne and ReliaQuest about the SUNBURST incident – you can now rewatch the entire session online!

SUNBURST was one of the most devastating cyberattacks in recent years and has sent shockwaves like no other attack before. Solorigate/SUNBURST impacted more than 420 of the Fortune 500 companies and thousands of government and commercial organizations. The attack on the ‘digital supply chain’ was uncovered in December 2020, although the foundation was made at the end of 2019 with the first organizations being infected in the second quarter of 2020.

Despite the widespread use of threat intelligence and EPP / EDR solutions, how did this happen? Why did the attack go undetected for so long? 

During this webcast, the course of the attack campaign will be traced and discussed by Elliotte Weng of SentinelOne and Martin Cook of ReliaQuest.

It will also explain how SentinelOne protected their customers from SUNBURST and how ReliaQuest responded immediately to protect their customer base with targeted threat intelligence, detection logic and automated enterprise wide retroactive threat hunting to surface and respond to any evidence of attack.

Click here to watch the webinar again in full

WEBINAR: Solorigate/SUNBURST – Chronology of a supply chain nightmare

960 640 Guest Post

By SentinelOne and ReliaQuest

SUNBURST was one of the most devastating cyberattacks in recent years and has sent shockwaves like no other attack before. Solorigate/SUNBURST impacted more than 420 of the Fortune 500 companies and thousands of government and commercial organizations. The attack on the ‘digital supply chain’ was uncovered in December 2020, although the foundation was made at the end of 2019 with the first organizations being infected in the second quarter of 2020.

Despite the widespread use of threat intelligence and EPP / EDR solutions, how did this happen? Why did the attack go undetected for so long? 

During this webcast on Tuesday 13 April at 10am BST, the course of the attack campaign will be traced and discussed. It will also explain how SentinelOne protected their customers from SUNBURST and how ReliaQuest responded immediately to protect their customer base with targeted threat intelligence, detection logic and automated enterprise wide retroactive threat hunting to surface and respond to any evidence of attack.

Together SentinelOne and ReliaQuest are protecting customers against these unforeseeable supply chain attacks and acting as a force multiplier for your security operations. 

Click Here To Register

WEBINAR REWIND: Ransomware Attack Simulation

553 289 Stuart O'Brien

In a special attack simulation, this Cybereason webinar looked at how multi-stage attack campaigns operate today – and you can now watch the entire session again online.

Presented by Cybereason Product Director Eric Sun, the webinar enables the audience to witness an attacker’s infiltration and watch the malicious operation as it moves across the entire environment.

You’ll see the many opportunities an attacker has to advance the operation, and the ways that your organisation as a defender can break the kill chain and end the attack before crown jewels are compromised.

Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise – Sun takes an in-depth look at how this happens, and what can can be done to stop it.

In today’s reality where prevention measures aren’t always enough and penetration can seem inevitable, the defenders need to out think, outpace, and quickly end even the most sophisticated attack.

Ultimately, you’ll come away with new knowledge on today’s attack campaigns and insights on how defenders can gain the upper hand. The session shares the attacker’s mindset and how it impacts our strategies as defenders.

Click here to watch now

WEBINAR REWIND: Managing The Compliance & Security Nightmares Caused By A Remote Workforce

960 640 Stuart O'Brien

Don’t worry if you missed last week’s brilliant webinar from Veriato – You can now watch the entire session again online!

In an in-depth and wide ranging talk, Veriato’s Director of EMEA Sales Director Chris Gilkes takes us through how your organisation can maintain compliance while employees are working remotely.

Why is this important? Put simply, as employees connect to servers each morning through VPN, to download corporate data that they need, compliance and security can easily be compromised. As soon as the employee disconnects from the VPN, corporate visibility is lost and compliance can’t be maintained.

There are precautions and best practices that are being employed by many organizations and should be part of the security and compliance infrastructure as companies adapt to the new norm of both people and sensitive data residing in remote locations.

Chris addresses how companies can protect themselves with the right tools to mitigate compliance and security concerns, encompassing:-

  • Maintaining compliance while employees work remotely
  • Maintaining Compliance when employees go offline
  • VPN vulnerabilities as a result of a remote workforce
  • The increased threat posed by remote employees

Click here or scroll down to watch the session in full!

Want to know more about Veriato’s Insider Threat Detection solutions? Click here for a free trial!

WEBINAR: Live Attack Simulation – Ransomware

553 289 Guest Post

Wednesday, March 24th @10:00 GMT

If you’re concerned about ransomware, whether it’s beating Ryuk, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you.  Join Cybereason for a live attack simulation, where we’ll discuss the latest ransomware trends, walk through a multi-stage attack, and show the side by side Defenders view. 

Beating modern ransomware attacks means not only preventing the ransomware from running, but finding and stopping the malicious behaviors that come before it. Our Nocturnus team researches every major strain of ransomware to continually improve our multi-layer prevention and our behavioural approach to threat detection with the Malop.

See our latest findings and why Cybereason arms you with fearless protection against ransomware to reduce risk across your enterprise.

Join us to learn:

– Why ransomware continues to evolve and common delivery methods 

– How ransomware is used as the “last step” in kill chains 

– See tactics and techniques used by FIN6 & UNC threat actors

Register today

WEBINAR: Managing the Compliance & Security Nightmares Caused By A Remote Workforce

960 640 Guest Post

Webinar – March 11th, 12pm GMT 

How do companies protect themselves with the right tools to mitigate compliance and security concerns?

There are precautions and best practices that are being employed by many companies, and should be part of the security and compliance infrastructure as companies adapt to the new norm of both people and sensitive data residing in remote locations.

In this Webinar we’ll discuss:

  • Maintaining compliance while employees work remotely
  • Maintaining Compliance when employees go offline
  • Monitoring the activity of employees working from home
  • The increased threat posed by remote employees?

Sign up for our latest Webinar on March 11th at 12pm GMT!

Sign Up Now!

WEBINAR: Security Champions – Making the Business Case

960 640 Guest Post

You have an awesome idea. You plan it in full. You share it with your colleagues. What happens next?

Hang-on… They’re not jumping up and down. In fact, they’re frowning. They don’t get it!

Sound familiar?

When that happens remember:

“If you want something to change, only you can make that happen”

Join us – 1st Feb for a Masterclass in Making the Business Case for Security Champions. 

https://us02web.zoom.us/webinar/register/1816100266890/WN_OgUMcWkuTqWWtlSZBHyvsw

We’ll look at:
· Finding your WHY for your Champions Programme through socially constructed change (e.g. impactful conversations)
· Creating a 5-minute pitch for your programme
· Establishing resource and budget requirements

  • 1
  • 2