Hi [[ session.user.profile.firstName ]]

The End of Ransomware

Learn more about ransomware: the types, how they work, specific variants, and more. We'll look at some of the most recent ransomware attacks and walk you through what the incident response process would look like.
Recorded Jan 10 2018 55 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Anthony Giandomenico, Senior Security Strategist & Researcher, FortiGuard Labs; Damien Lim, ATP Product Marketing
Presentation preview: The End of Ransomware

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Fighting Cybercime with Artificial Intelligence Recorded: Aug 21 2018 54 mins
    Mr Keith Rayle, Security Strategist, Fortinet FortiGuard Labs
    See how artificial intelligence can be used to stop malware more quickly. Learn more about the history of artificial intelligence dating back to nearly a century plus an examination of a system comprised of highly efficient deep machine learning neural networks that are currently deployed and proactively defeating malware attacks.
  • GDPR – Reconciling Regulations with Technology Recorded: May 17 2018 49 mins
    Mr Patrick Grillo, Snr Director Security Solutions
    It’s 2018 and May 25th , aka G-Day (GDPR day), is rapidly approaching. But did you know that even though the GDPR is a European Union regulation, it does impact organizations worldwide, including Asia.
  • Don't Click This Link Recorded: Mar 27 2018 34 mins
    Aamir Lakhani, Senior Security Strategist, FortiGuard Labs
    Find out what you need to know about the phishing phenomenon: consequences, techniques, and how to fight back with one of our leading FortiGuard Labs security strategists, plus the significant role of the human factor.
  • Avoid Security Landmines & Their Million Dollar Consequences Recorded: Feb 13 2018 39 mins
    Anthony Giandomenico, Senior Security Strategist & Researcher, FortiGuard Labs
    Each quarter, our expert threat researchers from FortiGuard Labs analyse data from millions of sensors around the globe to identify the most current and dangerous threats, and dissect how and why they are succeeding.

    Join this webinar for a first-hand look at this past quarter's findings, plus actionable steps to help you avoid these pitfalls. Learn more about these top takeaways that include:

    •Insight into the Equifax breach; Apache and other exploit trends
    •Evidence mobile malware is on the rise and how to stop it
    •A list of vulnerabilities attacked, by frequency so you can prioritize patching
  • What Successful Security Leaders are doing to Avoid Breaches Recorded: Jan 24 2018 26 mins
    Michael Reinhart, Sr. Director Product Marketing, Security Operations
    Learn what critical insights were derived from CISOs and other security professionals in this recent Forrester survey, including the resilient strategies that proved to be successful in avoiding breaches, as well as those that failed.
  • The End of Ransomware Recorded: Jan 10 2018 55 mins
    Anthony Giandomenico, Senior Security Strategist & Researcher, FortiGuard Labs; Damien Lim, ATP Product Marketing
    Learn more about ransomware: the types, how they work, specific variants, and more. We'll look at some of the most recent ransomware attacks and walk you through what the incident response process would look like.
  • Enable Security and Grow Your Business with the Industry’s leading connect UTM Recorded: Oct 24 2017 40 mins
    Peter Newton, Sr. Director of Product Marketing, Fortinet
    Join this webinar to understand the benefits of a unified view of your infrastructure and comprehensive security that keeps up with changing network requirements and technologies like cloud services and smart devices.
  • Gartner 2017 Magic Quadrant for Enterprise Firewalls Recorded: Oct 17 2017 23 mins
    John Maddison, Sr. Vice President, Products and Solutions, Fortinet
    Fortinet's Enterprise Firewall is an industry leader in completeness of vision on how to protect your network from the edge to the core to the cloud. Attend this webinar to understand how the Fortinet Enterprise Firewall.
    - Leverages FortiGate, FortiGuard, FortiManager and the recently released FortiOS 5.6 to provide the highest performing and most flexible protection of your network
    - Is deployed by enterprises like the Pittsburgh Steelers to ensure the toughest defense against threats; and
    - How and why the solution has been recognized as a leader by top analyst firms in the industry
  • The General Data Protection Regulation or “We Don’t Know What We Don’t Know” Recorded: Oct 10 2017 49 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The clock is ticking on the General Data Protection Regulation (GDPR) coming into effect and while there isn’t wide scale panic yet, lots of organizations are either 1) in denial or 2) just coming to grips with its implications.

    The difficulty with GDPR is that the regulation states the “WHAT” but pretty much is silent on the “HOW”. The overwhelming majority of the regulation deals with process, procedure and is it really necessary to collect the data and stresses the rights of the data subject. How to protect the data, in movement and in rest, is left to individual organizations to decide except for the vague mention of “continuous risk assessment” and “state of the art”.

    Another major change from the existing national regulations, which were enacted during the mid to late 1990s, GDPR takes into account the massive change in how technology plays in everyday. To protect the data subject, the punitive aspect of non-compliance is significant with penalties of €20M or 4% of annual turnover, whichever is GREATER.

    So in this confusing and changing environment, where do cyber security technologies come into play?

    This session will focus on the role of the underlying network in any organization’s GDPR compliance efforts and how to take advantage of certain aspects of GDPR to avoid the substantial penalties associated with the regulation.
  • It’s My Life but I no Longer Have Control Over it! Recorded: Dec 8 2016 49 mins
    Gavin Chow, Network and Security Strategist
    We all know that technology plays a role in our everyday life but do you know the extent of that role? Advertising tells us to spend more and more of our life online and embrace technology in our homes, cars and everywhere else a microchip can be placed.

    But nowhere is there a message about the consequences of the misuse of that technology. 2016 has seen a rise in the number of incidents involving ransomware, IoT, and simply well intentioned connectivity gone wrong. That momentum is set to continue into 2017 and beyond.

    Although past performance does not guarantee future results, this session will focus on what we have seen this year and what we expect to see in the near future.
  • One Firewall to Rule them All! Recorded: Nov 8 2016 27 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The firewall wars have caused nothing but confusion in the market. Lines have been drawn between UTM and NGFW; are they different or are they the same thing? Unfortunately that confusion has led to introducing complexity and vulnerability in enterprise networks. There is a better way. Rather than fighting through a sea of acronyms, focus on what’s really important - How can I simplify my security infrastructure and improve my ability to fight off advanced attacks, no matter where they occur in the network?

    This session will present a new way of thinking about firewalls, one without the confusion, acronyms and complexity.
  • Secure Unified Access Layer – Creating Universal Solutions Recorded: Jun 23 2016 36 mins
    Ben Wilson, Senior Director, Product Management, Fortinet
    During the past 15 years, access layer solutions have evolved, especially in terms wireless connectivity.

    Today's wireless connectivity has multiple approaches, each better meeting the specific requirements of organisations through a choice of different architectures. Whether its a refresh, redeployment, change of application or a brand new site, there are a lot of options.

    During this webinar we’ll examine different approaches and how to apply them to different verticals or deployment scenarios. As wireless connectivity continues to evolve, we will also look to the future and see how trends in new hardware can provide cutting edge solutions to meet the potential needs of tomorrow's organisations.

    The presentation will end with an overview of Fortinet's Secure Access Architecture and how it can meet today's and tomorrow's wireless requirements.
  • Advanced Threat Protection – Can Technology Alone Deliver What’s Needed? Recorded: Jun 16 2016 31 mins
    Matthew Kuan, Director, Solutions Marketing
    More and more solutions are crowding into the market but data breaches are still happening and there’s no end in sight. Is an over reliance of technology creating a false sense of “everything’s okay”? This session will focus on the three key aspects of comprehensive advanced threat protection; technology, awareness and in particular the role of threat intelligence.
  • Your Money or Your Life: Defeating Ransomware Recorded: Apr 21 2016 40 mins
    Jack Chan, Network and Security Strategist
    Ransomware is an ever-increasing threat to enterprises and new strains are being seen on a regular basis. This presentation starts by tracing the history of ransomware from its roots as being not much more than an annoyance, to the current highly sophisticated encrypting varieties.

    Following this will be a deep dive into how the malware is delivered to the victim, and an analysis of the different stages of an attack.
    Finally, we will look at methods of mitigating the attack in order to minimise or eliminate the damage done.
  • Security that counts: What’s in your Data Center? Recorded: Mar 22 2016 43 mins
    Ronen Shpirer
    The Data Center is not an island. It is part of a complex ecosystem, working and evolving together for the overall benefit of the enterprise.

    Data Center security can no longer be treated as an island. It must integrate and interact with the overall enterprise ecosystem and security infrastructure to provide a real-time, effective security posture.

    This webinar will present a high level view as to the importance of deploying an integrated, end-to-end enterprise security platform for achieving data center security.

    Because sometimes, the best data center security solution has nothing to do with the data center!
  • Advanced Threat Protection: For all of the Network, All of the Time Recorded: Feb 25 2016 48 mins
    Patrick Grillo, Senior Director, Security Solutions, Fortinet
    The headlines are full of claims by security companies having the key to solving the problem of Advanced Persistent Threats (APT).

    However, on closer inspection it seems that while the technology that they’re touting is interesting, it’s only a partial solution because it only addresses part of the problem.

    In today’s changing threat horizon, attacks can come from anywhere, at anytime and in any form. An effective Advanced Threat Protection (ATP) capability must be able operate in the same manner - everywhere in the network, with any technology and fully collaborative.

    This webinar will present and focus on the following:
    1.The range of technologies needed
    2.How to close off exploitable gaps with common threat intelligence
    3.Technology is only part of the final solution
  • The Evolving Threat Landscape Recorded: Dec 3 2015 47 mins
    Simon Bryden, Consulting Systems Engineer & Matthew Kuan, Fortinet
    This webinar reviews some of the headline attacks and threat events of 2015, then asks what can be learned from them. After looking at some of the trends and directions that today's attacks are taking, it looks at key challenges facing the enterprise, and how they can be addressed by leveraging the latest developments in security technologies, combined with constantly updated threat intelligence.
  • Secure Access Architecture – Understanding the choices and why they matter Recorded: Nov 26 2015 45 mins
    Ben Wilson, Senior Director, Product Management, Fortinet
    Wireless is now the expected medium of choice for network users. Delivering it successfully can be a challenge especially with multiple different approaches and architectures available. What is right for your organisation? Cloud? Controller? How is it all secured?

    This session will discuss 3 main Wi-Fi architecture types, their different advantages, the wired edge, and how to secure it all. Importantly, we will finish with what to consider when making the right choice for your needs.
  • Internal Segmentation Firewall: Securing the Network from the Inside-Out Recorded: Nov 10 2015 59 mins
    Ronen Shpirer, Security Solutions Architect, Fortinet
    As organisations embrace the latest IT technology, such as Mobility and Cloud, the traditional network boundaries are becoming increasingly complex to control and secure. There are now many different ways into an enterprise network.

    Organisations have focused on building defences across the borders of their networks, leaving the internal network flat and open. However, advanced threats use this to their advantage because, once inside, they get free access to the entire enterprise network and assets.

    In this webinar we will present:
    1.The state of enterprise security
    2.Hard on the outside and chewy on the inside – internal network risks
    3.Internal Segmentation Firewall to the rescue – protecting the network from the inside-out
  • A Voyage: From Security to Software Defined Security Recorded: Sep 23 2015 21 mins
    Gary Gardiner, A/NZ Director of Engineering & Services
    With the growing adaptation of Software-Defined technologies as the foundation for enterprises’ data centers, private & hybrid clouds and overall IT agility, security infrastructure transformation must take place to efficiently integrate with the Software-Defined ecosystem and become software defined itself. This presentation will highlight the need for Software Defined Security (SD-Security) and Fortinet’s framework to deliver optimized security for the Software Defined IT.
Fortinet APAC
Fortinet is a global leader and innovator in Network Security. Our mission is to deliver the most innovative, highest performing network security platform to secure and simplify your IT infrastructure.

We are a provider of network security appliances and security subscription services for carriers, data centers, enterprises, distributed offices and MSSPs. Because of constant innovation of our custom ASICs, hardware systems, network software, management capabilities and security research, we have a large, rapidly growing and highly satisfied customer base, including the majority of the Fortune Global 100, and we continue to set the pace in the Network Security market.

Our market position and solution effectiveness has been widely validated by industry analysts, independent testing labs, business organizations, and the media worldwide. Our broad product line of complementary solutions goes beyond Network Security to help secure the extended enterprise.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: The End of Ransomware
  • Live at: Jan 10 2018 6:00 am
  • Presented by: Anthony Giandomenico, Senior Security Strategist & Researcher, FortiGuard Labs; Damien Lim, ATP Product Marketing
  • From:
Your email has been sent.
or close