Detecting and Stopping Online Attacks

Logo
Presented by

Joan Goodchild - Dark Reading ; John Sawyer - IOActive, Inc. ; Dmitriy Ayrapetov - SonicWall

About this talk

Today’s cyber attackers can compromise your systems using a variety of methods, from well-disguised malware to sophisticated, targeted exploits aimed right at your company. How can you identify these attacks quickly and respond effectively? In this Dark Reading webinar, top experts discuss executive strategies and actionable methods your security operations team can use to detect different types of attacks and trigger a quick, effective response. Hear from Joan Goodchild, Senior Editor, Dark Reading, John Sawyer, Associate Director of Services IOActive, Inc. and Dmitriy Ayrapetov, Vice President Platform Architecture, SonicWall — our panelists will discuss: • Methods cyber attackers often use to compromise your systems • Tips to recognize well-disguised malware used in targeted exploits • Actionable advice on how to respond quickly and effectively to attacks • Understand how your security operations team can use actionable insight and methods for a quick response

Related topics:

More from this channel

Upcoming talks (10)
On-demand talks (369)
Subscribers (23911)
SonicWall delivers Boundless Cybersecurity for the hyper-distributed era in a work reality where everyone is remote, mobile and unsecure. SonicWall safeguards organizations mobilizing for their new business normal with seamless protection that stops the most evasive cyberattacks across boundless exposure points and increasingly remote, mobile and cloud-enabled workforces. By knowing the unknown, providing real-time visibility and enabling breakthrough economics, SonicWall closes the cybersecurity business gap for enterprises, governments and SMBs worldwide. For more information, visit www.sonicwall.com or follow us on Twitter, LinkedIn, Facebook and Instagram.