On the surface, spotting malicious attacks can be difficult. Hackers are expanding their malware distribution networks by exploiting commonly used applications to carry and distribute their malicious software. In the wake of the three major attacks Wanna Cry, DocuSign, and Google Docs malware outbreak we will examine how malware is distributed and provide guidelines on how to secure infrastructures against the next attack.
About the Presenter:
Alex Holden is the founder and CISO of Hold Security. Holden is credited with the discovery of many high profile breaches including Adobe Systems, initial vendor breach that led to the discovery of the JPMorgan Chase breach, and the independent discovery of the Target and Yahoo breaches. Considered one of the leading security experts, he regularly voices his professional opinion in mainstream media.
On Friday the news broke: a massive ransomware attack which started in the UK NHS immediately spread to global proportions. By Sunday, the attack had impacted over 200,000 organizations in 150 countries. Listen to Phil Richards, CSO of Ivanti and a panel of security experts discuss how to recover from the WanaCrypt Ransomware attack and safeguard your environment against the evolving threats that are likely to come.
• Phil Richards, CISO
• Chris Goettl, Manager of Product Management, Security
About Phil Richards:
Phil Richards is the Chief Information Security Officer (CISO) for Ivanti. He has held other senior security positions including the head of operational security for Varian Medical Systems, Chief Security Officer for Fundtech Corporation and Business Security Director for Fidelity Investments.
Ransomware attacks are on the rise. The biggest ransomware attack to date, Wannacry hit hundreds of thousands of computers in 150 countries. It disrupted business operations around the world, but more importantly, it also hit hospitals and endangered patent care. The next ransomware nightmare could be worse.
Join this interactive panel of security experts as they discuss:
- The lessons learned from Wannacry and similar ransomware attacks
- The impact of the attack
- How to best protect against ransomware
- The need for international collaboration in fighting malware
- Sebastien Boire-Lavigne, EVP and CTO of XMedius
- Fred Wilmot, CTO at PacketSled
- Usman Choudhary, Chief Product Officer of VIPRE
- Ted Harrington, Executive Partner at Independent Security Evaluators
The recent WannaCry ransomware attack was unprecedented in scale. With over 230,000 computers infected in over 150 countries, it is the largest cyberextortion scheme ever. More importantly, some experts fear that the danger is far from over.
Join this panel of security leaders as they discuss:
- What is WannaCry?
- Why did it spread so quickly and at such a scale?
- How can we protect our companies against this and similar cyber attacks?
- Threatscape: What can we expect to see in the future?
- Lance Cottrell, Chief Scientist at Ntrepid Corp.
- Brian Minick, CEO of Morphick
- Sven Krasser, Chief Scientist at CrowdStrike
- RJ Gazarek, Product Manager at Thycotic
With the Petya ransomware attack following closely on the heels of WannaCry, security teams worldwide must reassess their ransomware-readiness.
What are best practices for preventing, detecting, and remediating ransomware attacks?
Watch this webinar for hard data and proven strategies for answering those questions. You'll learn:
• Details on the latest ransomware attacks, including WannaCry and its variants
• The most common challenges organizations face in combating ransomware
• Strategies for mitigating ransomware attacks of all varieties
As organizations worldwide are trying to get back to normal in the messy aftermath of the biggest ransomware attack to date, cybersecurity experts see this attack as a warning. If even basic malware can leave such a global impact on enterprises, health organizations, universities and other organizations, what would a more sophisticated attack look like?
Join this CISO panel of security leaders as they discuss:
- The impact of Wannacry and the reasons behind it
- What can we learn from this attack and steps to take today
- How likely are we to see this type of attack repeated on a more devastating scale in the future
- What should organizations and enterprises do to improve their security posture in the age of ransomware, phishing scams, and IoT
- Mark Weatherford, Chief Cybersecurity Strategist at vArmour
- Gary Hayslip, CISO of Webroot
- Simon Crosby, CTO of Bromium
This past week we saw the emergence of a worm-based ransomware attack in wannacry that showed us how damaging these attacks can be to critical services society relies on.
This presentation will cover the recent wannacry attacks and what we have learned from them. In addition, we'll discuss the evolution of ransomware in recent years, focusing on attacks targeted against enterprises and so-called "high-interaction" ransomware attacks. Attendees will also be given a path forward of protecting their institution. A discussion of the renewal of Business Continuity and Disaster Recovery as a result and what this means for fintech going forward.
About the Presenter:
John Bambenek is Manager of Threat Intelligence Systems at Fidelis Cybersecurity and an incident handler with the Internet Storm Center. He is also a faculty member of the Department of Computer Science at the University of Illinois where he teaches courses in cybersecurity. He has been researching security threats and criminal organizations for 17 years and coordinating with US and foreign law enforcement entities to help bring criminal actors to justice.
In early May, the world witnessed a massive ransomware campaign that had a crippling effect on businesses in multiple industries across the globe. What made this ransomware, called WannaCry, so different than others was the ransomware’s ability to combine lateral movement. As opposed to other ransomware that typically infects a few devices within an organization, WannaCry had worm-like capabilities, spreading itself throughout the organizational network and hitting servers.
While a “kill-switch” was used against WannaCry, organizations are undoubtedly going to continue suffering from WannaCry’s remnants within organizations. More so, the impact of WannaCry will motivate ransomware authors to start adopting lateral movement capabilities. Yet, with all the advanced malware techniques, security professionals are required to ensure the continuous operations of their systems.
In this webinar, you will:
- Learn about EternalBlue - the exploit in Microsoft's implementation of the SMB protocol that enabled WannaCry to propagate throughout the organization
- Watch how WannaCry attacks an unpatched endpoint and encrypts data
- Receive strategies and best practices to ensure that your systems are protected from advanced ransomware
The world is experiencing a ransomware attack like no other. While the wave of infections was spreading from East to West, a kill switch was identified that slowed the campaign considerably. Then another kill switch was needed, then another. Against popular belief, these kill switches are only effective against the original strain of the malware. In this presentation, we will review a variant without a registerable web site kill switch and how to protect against it.
Join this webinar and ask your most pressing WannaCry questions.
About the Presenter:
Mounir Hahad, Ph.D. is Sr Director at Cyphort, a Security Analytics company headquartered in Santa Clara, CA. Mounir is the head of Cyphort Labs, the group responsible for conducting threat research within Cyphort and driving detection enhancements for Cyphort’s Advanced Detection Fabric which uses behavioral analysis along with machine learning to detect advanced threats and correlate those incidents with ingested information from third party solutions. Mounir holds a Ph.D. in computer science from the University of Rennes. Prior to Cyphort, Mounir held various engineering management positions with Cisco’s Security Technology Group and with IronPort Systems.