Webinar Archives - Page 2 of 3 - Security IT Summit | Forum Events Ltd
Posts Tagged :

Webinar

WEBINAR REWIND: Solorigate/SUNBURST – Chronology of a supply chain nightmare

960 640 Stuart O'Brien

Don’t worry if you missed last week’s essential webinar from SentinelOne and ReliaQuest about the SUNBURST incident – you can now rewatch the entire session online!

SUNBURST was one of the most devastating cyberattacks in recent years and has sent shockwaves like no other attack before. Solorigate/SUNBURST impacted more than 420 of the Fortune 500 companies and thousands of government and commercial organizations. The attack on the ‘digital supply chain’ was uncovered in December 2020, although the foundation was made at the end of 2019 with the first organizations being infected in the second quarter of 2020.

Despite the widespread use of threat intelligence and EPP / EDR solutions, how did this happen? Why did the attack go undetected for so long? 

During this webcast, the course of the attack campaign will be traced and discussed by Elliotte Weng of SentinelOne and Martin Cook of ReliaQuest.

It will also explain how SentinelOne protected their customers from SUNBURST and how ReliaQuest responded immediately to protect their customer base with targeted threat intelligence, detection logic and automated enterprise wide retroactive threat hunting to surface and respond to any evidence of attack.

Click here to watch the webinar again in full

WEBINAR: Solorigate/SUNBURST – Chronology of a supply chain nightmare

960 640 Guest Post

By SentinelOne and ReliaQuest

SUNBURST was one of the most devastating cyberattacks in recent years and has sent shockwaves like no other attack before. Solorigate/SUNBURST impacted more than 420 of the Fortune 500 companies and thousands of government and commercial organizations. The attack on the ‘digital supply chain’ was uncovered in December 2020, although the foundation was made at the end of 2019 with the first organizations being infected in the second quarter of 2020.

Despite the widespread use of threat intelligence and EPP / EDR solutions, how did this happen? Why did the attack go undetected for so long? 

During this webcast on Tuesday 13 April at 10am BST, the course of the attack campaign will be traced and discussed. It will also explain how SentinelOne protected their customers from SUNBURST and how ReliaQuest responded immediately to protect their customer base with targeted threat intelligence, detection logic and automated enterprise wide retroactive threat hunting to surface and respond to any evidence of attack.

Together SentinelOne and ReliaQuest are protecting customers against these unforeseeable supply chain attacks and acting as a force multiplier for your security operations. 

Click Here To Register

WEBINAR REWIND: Ransomware Attack Simulation

553 289 Stuart O'Brien

In a special attack simulation, this Cybereason webinar looked at how multi-stage attack campaigns operate today – and you can now watch the entire session again online.

Presented by Cybereason Product Director Eric Sun, the webinar enables the audience to witness an attacker’s infiltration and watch the malicious operation as it moves across the entire environment.

You’ll see the many opportunities an attacker has to advance the operation, and the ways that your organisation as a defender can break the kill chain and end the attack before crown jewels are compromised.

Today’s attackers are able to translate a successful phish into persistent, stealthy network compromise – Sun takes an in-depth look at how this happens, and what can can be done to stop it.

In today’s reality where prevention measures aren’t always enough and penetration can seem inevitable, the defenders need to out think, outpace, and quickly end even the most sophisticated attack.

Ultimately, you’ll come away with new knowledge on today’s attack campaigns and insights on how defenders can gain the upper hand. The session shares the attacker’s mindset and how it impacts our strategies as defenders.

Click here to watch now

WEBINAR REWIND: Managing The Compliance & Security Nightmares Caused By A Remote Workforce

960 640 Stuart O'Brien

Don’t worry if you missed last week’s brilliant webinar from Veriato – You can now watch the entire session again online!

In an in-depth and wide ranging talk, Veriato’s Director of EMEA Sales Director Chris Gilkes takes us through how your organisation can maintain compliance while employees are working remotely.

Why is this important? Put simply, as employees connect to servers each morning through VPN, to download corporate data that they need, compliance and security can easily be compromised. As soon as the employee disconnects from the VPN, corporate visibility is lost and compliance can’t be maintained.

There are precautions and best practices that are being employed by many organizations and should be part of the security and compliance infrastructure as companies adapt to the new norm of both people and sensitive data residing in remote locations.

Chris addresses how companies can protect themselves with the right tools to mitigate compliance and security concerns, encompassing:-

  • Maintaining compliance while employees work remotely
  • Maintaining Compliance when employees go offline
  • VPN vulnerabilities as a result of a remote workforce
  • The increased threat posed by remote employees

Click here or scroll down to watch the session in full!

Want to know more about Veriato’s Insider Threat Detection solutions? Click here for a free trial!

WEBINAR: Live Attack Simulation – Ransomware

553 289 Guest Post

Wednesday, March 24th @10:00 GMT

If you’re concerned about ransomware, whether it’s beating Ryuk, stopping data exfiltration, or preventing the latest trend of “double extortion”, this session is for you.  Join Cybereason for a live attack simulation, where we’ll discuss the latest ransomware trends, walk through a multi-stage attack, and show the side by side Defenders view. 

Beating modern ransomware attacks means not only preventing the ransomware from running, but finding and stopping the malicious behaviors that come before it. Our Nocturnus team researches every major strain of ransomware to continually improve our multi-layer prevention and our behavioural approach to threat detection with the Malop.

See our latest findings and why Cybereason arms you with fearless protection against ransomware to reduce risk across your enterprise.

Join us to learn:

– Why ransomware continues to evolve and common delivery methods 

– How ransomware is used as the “last step” in kill chains 

– See tactics and techniques used by FIN6 & UNC threat actors

Register today

WEBINAR: Managing the Compliance & Security Nightmares Caused By A Remote Workforce

960 640 Guest Post

Webinar – March 11th, 12pm GMT 

How do companies protect themselves with the right tools to mitigate compliance and security concerns?

There are precautions and best practices that are being employed by many companies, and should be part of the security and compliance infrastructure as companies adapt to the new norm of both people and sensitive data residing in remote locations.

In this Webinar we’ll discuss:

  • Maintaining compliance while employees work remotely
  • Maintaining Compliance when employees go offline
  • Monitoring the activity of employees working from home
  • The increased threat posed by remote employees?

Sign up for our latest Webinar on March 11th at 12pm GMT!

Sign Up Now!

WEBINAR: Security Champions – Making the Business Case

960 640 Guest Post

You have an awesome idea. You plan it in full. You share it with your colleagues. What happens next?

Hang-on… They’re not jumping up and down. In fact, they’re frowning. They don’t get it!

Sound familiar?

When that happens remember:

“If you want something to change, only you can make that happen”

Join us – 1st Feb for a Masterclass in Making the Business Case for Security Champions. 

https://us02web.zoom.us/webinar/register/1816100266890/WN_OgUMcWkuTqWWtlSZBHyvsw

We’ll look at:
· Finding your WHY for your Champions Programme through socially constructed change (e.g. impactful conversations)
· Creating a 5-minute pitch for your programme
· Establishing resource and budget requirements

WEBINAR: Get employees invested in your cyber strategy

960 640 Stuart O'Brien

With most business now conducted online, there’s a temptation to automate education too. But beware, removing opportunities for conversation impedes people’s ability to change. At a time when cybercriminals exploit human vulnerabilities, proactive secure behaviours are paramount.

Organisations are finding success in developing networks of Security Champions. Security Champions provide context and meaning around security. Critically they facilitate change at the grassroots of a business and support changes to process and behaviour.

Join Layer 8 for their free Masterclass (1st Feb) – The Culture Coach: Security Champions – Making the Business Case

Register Here

WEBINAR REWIND: How to Tackle Working From Home Security Threats

960 640 Stuart O'Brien

Last week ZIVVER hosted a webinar during which participants learned the secrets to securing an organization’s communications while safeguarding against costly data leaks with a remote workforce – if you missed this essential session you can re-watch it again now.

The lively 30 minute discussion includes expert insight and opinion from:

  • Quentyn Taylor is Head of Security for one of the largest enterprises in London. He is regarded as a key security commentator and is regularly quoted and published in industry publications and mainstream media.
  • Becky Pinkard is a renowned practitioner and commentator on the information security sector who has been working in information technology and security since 1996.
  • Rick Goud is the co-founder and CEO of Zivver, one of the top secure communication platform companies in Europe.

Tops covered off include:

  • Behind the stats: the top causes of data breaches in the UK
  • Data leak blunders and how to prevent them 
  • Evolving security threats with a remote workforce 
  • Modern solutions to secure outbound communications 

Watch again by clicking here

Securing outbound email is vital to help safeguard sensitive information and prevent data leaks. The good news is that this can be done easily and affordably with ZIVVER’s secure communication platform.

Getting started is easy

Setting up a ZIVVER account for up to 50 users can be conveniently done from any device in just a few clicks, 24 hours a day, 7 days a week. Simply choose the desired plan, select the number of users, and pay with a credit card to immediately begin sending communications securely.

Use the code WFH30UK to get 30% off for the first 3 months of your subscription – Click here to get started.

WEBINAR: How to Tackle Working From Home Security Threats

960 640 Stuart O'Brien

Learn the secrets to securing your organization’s communications while safeguarding against costly data leaks with a remote workforce. 

This April 30 webinar from ZIVVER features three industry experts who will bring you up to speed on the new threat landscape. 

Stay alert to WFH security threats 

Be in the know and hear about the following:

  • Behind the stats: the top causes of data breaches in the UK
  • Data leak blunders and how to prevent them 
  • Evolving security threats with a remote workforce 
  • Modern solutions to secure outbound communications 

Learn from these IT security experts

We’re delighted to have two incredible guest panelists alongside ZIVVER’s co-founder and CEO, Rick Goud. They’re ready to share valuable insights on how to effectively secure outbound communications.

  • Quentyn Taylor is Head of Security for one of the largest enterprises in London. He is regarded as a key security commentator and is regularly quoted and published in industry publications and mainstream media.
  • Becky Pinkard is a renowned practitioner and commentator on the information security sector who has been working in information technology and security since 1996.
  • Rick Goud is the co-founder and CEO of one of the top secure communication platform companies in Europe.

Following the panel discussion there will be an interactive Q&A session where you can ask questions.

Click here to register for the webinar