Top 10 favorite exploits of cyberattackers and how to stop them (on a budget)
Sophisticated cyberattackers are routinely exploiting vulnerabilities in 2020, and you may be surprised by the tactics that they are using. Cybersecurity expert Duncan McAlynn uses the latest data from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) to reveal a cybercriminal’s favorite exploits. He also highlights the industry study’s top 10 most exploited flaws.
In this webcast, you’ll learn about:
-Top 10 most exploited vulnerabilities
-Threat intelligence and countermeasures
-New attack vectors seen in 2020
-Strategies to mitigate targeted intrusions
-Resources that can help improve your security posture
RecordedNov 23 202060 mins
Your place is confirmed, we'll send you email reminders
Small businesses are the backbone of the economy, yet many are woefully underprepared for cybersecurity threats. A common misconception is that having a resilient network is going to be costly. That isn’t so … if security is addressed in the right ways.
Pulling on his two and a half decades of experience consulting directly with small and medium-sized organizations, information security expert Kevin Beaver explores:
* Top weaknesses in SMBs, where the stakes are high and the resources are limited.
* Down-to-earth suggestions on how to best address the security gaps.
* How small businesses can have networks that are as secure as the largest of enterprises without breaking the bank.
Eric Eddy, Technical Marketing Engineer and Nada MacKinney, Product Marketing Manager - Cisco Cloud Security
The global pandemic has accelerated the move of edge security controls to a cloud-delivered model. But it hasn’t changed our needs for effective threat detection and reliable, fast secure access. The best way for security teams to meet these new challenges head-on is through a secure access service edge (SASE) service.
Watch this webinar to learn why it’s important to have:
• Networking and security solutions that are designed to work together
• Efficient and effective cloud-delivered security
• Vendor consolidation and ease of deployment
• Management that will scale with the needs of your business.
In this session we will also review new AV-TEST security efficacy results comparing Secure Web Gateway and DNS-layer security vendors. Come find out who protects roaming and remote users the best!
Paul D'Cruz Director, Cyber Security EMEAR at Cisco Umbrella and Kevin Fielder, CISO at Just Eat
Grab a cup of coffee and join us to hear from Kevin Fielder, CISO from Just Eat who will share experiences of delivering a rapid response to business challenges in 2020.
Companies of all sizes and industries are having to adapt to unpredictable business challenges this year from working remotely; protecting data; adapting to customer needs and changing their roadmap to move with the changing environment.
In this session, we will discuss how as an organisation Just Eat has made adjustments and adapted their roadmap accordingly. Join us to hear security best practices and lessons learned from Kevin.
In today's business environment, more users are remote than ever before, and the boundaries of the workplace are blurring. But in most organizations, security is still seen as an issue to be addressed at the data center, not at the cloud edge. With software as a service (SaaS) app usage and infrastructure as a service (IaaS) applications on the rise, traditional perimeter-based security can't keep up. Users need every one of those devices to have fast, reliable access to the internet, so they can be as productive as possible and stay protected.
In this webinar, we’ll discuss three mistakes to avoid when developing an SD-WAN security plan:
1) Adopting SD-WAN without a security strategy
2) Choosing solutions that don’t integrate easily with your existing investments
3) Treating protection for branch offices and roaming users as an afterthought
Reap the benefits of a converged approach to networking and security while avoiding the risk. We’ll show you how quickly you can deploy SD-WAN and Cisco Umbrella across your network to keep users and data secure wherever they work, on whatever devices or apps they choose.
Determining which rules and regulations apply to an organization is not easy undertaking. Oftentimes, companies need to comply with multiple controls and regulations, many of which have overlapping statutes along with stiff penalties for non-compliance. Watch our on-demand webinar as Duncan McAlynn demystifies common cybersecurity frameworks and regulatory requirements to help organizations improve their security posture and achieve compliance.
Key takeaways:
* Compliance versus security and how to recognize the difference
* Know which regulations are related to your company or industry
* How to keep up with the ever-changing state regulations
* What to do and who to notify when you’ve suffered a security incident
* How to establish a security roadmap for your organization
Ishaan Korotane, Consulting Systems Engineer at Cisco Umbrella
When you look at the transition to cloud and transformation of the network, how does it impact how you think about security?
The majority of infections happen in 3 ways. So if we know this –why can’t we stop the rise of attacks?
Watch this session as we take a closer look at the #1 vector for attacks: email, the #1 target for attacks: endpoint and the #1 source of most attacks, the Internet.
Find out how to stop these attacks before they start, and safeguard your organisation against this turbulent attack.
Marko Tanaskovic, Technical Solutions Architect at Cisco Umbrella
Join us for this webinar: A Look into Cisco Umbrella’s Secure Internet Gateway.
This session will illustrate the benefits enabled by cloud-delivered security with practical examples.
The following services will be reviewed: DNS-layer, intelligent proxy, full proxy, firewall as service, cloud access security brokerage service and roaming users coverage.
You will also learn how Umbrella enables branch transformation, increases security posture with leading DNS-layer (added layer) protection, allows for secure XaaS adoption and supports customers' cloud-first strategies
Today’s networks are transforming digitally before our eyes. Organizations across the globe are either cloud-first or cloud-next, and are moving their workforce, workplace, and workloads to cloud service applications and infrastructure.
To effectively – and efficiently – secure this new reality, organizations are seeking solutions that maximize:
- Simplicity: Move from fragmented cloud and endpoint security to maximized protection, via a fully integrated cloud-to-endpoint solution, eliminating the struggle of integrating multiple, disparate tools.
- Visibility: Gain cloud-to-endpoint visibility across an environment that prioritizes information, so your team sees what’s critical, and where - right now.
- Efficiency: Immediately take action across multiple security layers, and move from manually clicking to pre-built and customizable, automated workflows from cloud-to-endpoint.
Learn how combining Cisco Umbrella and AMP for Endpoints and powering it with SecureX, our cloud-native, built-in platform technology, can smooth your transition to the cloud and protect your remote workforce by maximizing your defense.
Sophisticated cyberattackers are routinely exploiting vulnerabilities in 2020, and you may be surprised by the tactics that they are using. Cybersecurity expert Duncan McAlynn uses the latest data from the United States Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) to reveal a cybercriminal’s favorite exploits. He also highlights the industry study’s top 10 most exploited flaws.
In this webcast, you’ll learn about:
-Top 10 most exploited vulnerabilities
-Threat intelligence and countermeasures
-New attack vectors seen in 2020
-Strategies to mitigate targeted intrusions
-Resources that can help improve your security posture
Xavi Garcia Faura, Security Sales Leader at Cisco Umbrella
El aumento del uso de SaaS, la proliferación de sedes remotas, el crecimiento masivo de trabajadores itinerantes; esto es la nueva normalidad. Garantizar la seguridad de esta realidad centrada en la nube es primordial.conozca el avance de Cisco en la convergencia SASE, incluyendo la convergencia de la seguridad en la nube y el SD-WAN. Conozca las nuevas funcionalidades de nuestro proxy y firewall en la nube, nuestro CASB y la integración de todas estas soluciones de seguridad en SecureX, para poder dar una visibilidad más detallada y mejor control de tráfico internet, al mismo tiempo que simplifica su operación y administración.
Ishaan Korotane, Technical Solutions Specialist at Cisco Umbrella
Users today work from anywhere — and they’ll often bypass the VPN to get work done. Sound familiar? Get the boost you need to secure your apps, data, and users whenever they’re on the move.
Built into the foundation of the internet, Cisco Umbrella is a cloud security service that provides a first line of defense against threats, wherever users access the internet — on or off the corporate network. Umbrella is deployed enterprise-wide in minutes and gives your security team the threat intelligence and context they need to block threats before they become attacks.
Join this 20 minute live demo to learn how you can:
-See and block threats other solutions miss
-Reduce alerts and gain context into high-priority threats
-Deploy in minutes to protect all devices and locations
-Integrate seamlessly with your existing security stack
Malware and ransomware are some of the most complicated security threats your business faces. From the largest of enterprises to the smallest of startups, these threats know no boundaries. Information security expert and Hacking for Dummies author Kevin Beaver shares the realities of dealing with and defeating malware and ransomware. Kevin explores: * how to evaluate your existing risks to malware and ransomware along with the common vulnerabilities that lead to exposures * how to prevent malware and ransomware from taking over your network * how to minimize the impact of security events that do occur Watch now.
Ishaan Korotane, Consulting Systems Engineer at Cisco Umbrella
This webinar is for any small to medium sized business that may be feeling overwhelmed by IT security threats. During this session we will look at how Cisco Umbrella can help small businesses and what you can do to protect your data and employees
Join this live demo to learn how you can:
- See and block threats other solutions miss
- Reduce alerts and gain context into high-priority threats
- Deploy in minutes to protect all devices and locations
- Secure your apps, data and users whenever they are on the move
- Integrate seamlessly with your existing security stack
You’ll see how easy it is and that you don’t need to be an IT expert to use Cisco Umbrella. Register now to view this session!
More about Cisco Umbrella: Built into the foundation of the internet, Cisco Umbrella is a cloud security platform that provides a first line of defense against threats, wherever users access the internet — on or off the corporate network. Umbrella is deployed enterprise-wide in minutes and gives you the threat intelligence and context you need to block threats before they become attacks.
Luke Hebditch, Systems Engineer, Cloud Security at Cisco Umbrella and Mark Anderson, Consulting Systems Engineer Cisco Meraki
Cisco Umbrella and Cisco Meraki have both revolutionised the way we manage and protect our networks and devices through the cloud. Both solutions provide rapid provisioning, an intuitive dashboard and simple policy-based management.
Cisco Meraki MX Security appliances and Cisco Umbrella offer simple and effective protection for your network. Umbrella is a DNS-layer security solution built into the backbone of the Internet. It blocks users from accessing malicious sites before the connection is made, and offers the first line of defense against security breaches in your organisation.
With Cisco Umbrella, it takes only a few clicks to set up custom policies and deploy them across your Meraki MX security appliances in minutes.
Threat actors have always played the game of emotions. Fear is the emotion they are using right now to lure users to click on an email or manipulate them to install an application.
In the last four months, cyber criminals have used fear as their main weapon to compromise users by using pandemic-related themes to deliver malware. The dropped malwares are deadlier and stealthier and are hybrid in nature. There is a need for advanced investigation techniques, like memory forensics in the case of ransomware attacks that are ransacking health sectors and entropy-based detection for new-age trojan exfiltrations.
Learn how we use traditional methods to identify these threats and also add a pinch of new-age forensics tricks to do some big reveals.
With an unprecedented shift to remote work, new cybersecurity challenges are emerging, along with many new opportunities for cybercriminals to exploit.
Join cybersecurity expert ,Duncan McAlynn, who will shine a light on this issue and provide key tips on addressing remote employees, as well as how to adjust to office life again when things settle down.
You will learn how to address the challenges of remote working scenarios such as:
•Employee-introduced unmanaged devices and networks
•Necessity of rapid VPN deployments and usage
•Cost, complexity and duplicity of shadow IT services
•Corporate legal issues arising from TOS acceptance
•Potential for data compromise
•Reducing single points of failure
•We look forward to sharing these insights with you and helping your organization stay safe and protected.
Paul D'Cruz Director, Cyber Security EMEAR at Cisco Umbrella and John Grady , Analyst at ESG
Threats, network complexity, and inefficient tools — all of these factors drive the need for a new approach to network security.
With more mobile devices, more cloud access, and a wide assortment of point tools, it’s hard for organisations to enforce consistent policy and efficiently respond to threats. SASE has seen immense interest, but questions remain about what functionality should be included, the drivers for this transition, and the most important attributes for these types of solutions. Recent ESG research on elastic cloud gateways provides answers to these and other related questions.
Join us and find out why more than 90% of organisations are fed up with managing multiple tools and are interested in a converged, cloud-delivered approach to network security.
The session is focused on the ways DNS can be used to improve protection against ransomware campaigns and speed up investigations of such incidents. We will cover fresh tactics, techniques, and procedures (TTPs) used by ransomware actors which actively adopt advanced persistent threat (APT)-style tactics and evasion techniques.
These actors’ goals have shifted from deploying ransomware on a few vulnerable machines to achieving persistence in the network and causing maximum damage to push victims into paying the ransom.
We will share DNS-based classifiers developed by the Cisco Umbrella team and discuss our approach to building them based on changes in the threats landscape.
Moneim Yehia, Cyber Security Systems Engineer at Cisco Umbrella
Users today work from anywhere — and they’ll often bypass the VPN to get work done. Sound familiar? Get the boost you need to secure your apps, data, and users whenever they’re on the move. Built into the foundation of the internet, Cisco Umbrella is a cloud security platform that provides a first line of defense against threats, wherever users access the internet — on or off the corporate network. Umbrella is deployed enterprise-wide in minutes and gives your security team the threat intelligence and context they need to block threats before they become attacks. Join this live demo, in Arabic to learn how you can:
See and block threats other solutions miss
Reduce alerts and gain context into high-priority threats
Deploy in minutes to protect all devices and locations Integrate seamlessly with your existing security stack
Small businesses are the backbone of the economy, yet many are woefully underprepared for cybersecurity threats. A common misconception is that having a resilient network is going to be costly. That isn’t so … if security is addressed in the right ways.Pulling on his two and a half decades of experience consulting directly with small and medium-sized organizations, information security expert Kevin Beaver explores: * Top weaknesses in SMBs, where the stakes are high and the resources are limited. * Down-to-earth suggestions on how to best address the security gaps. * How small businesses can have networks that are as secure as the largest of enterprises without breaking the bank. Watch now to learn more.
Cisco Umbrella provides a cloud-delivered network security service that blocks advanced attacks, as well as malware, botnets and phishing threats regardless of port, protocol or application. Our predictive intelligence uses machine learning to automate protection against emergent threats before your organization is attacked. Umbrella protects all your devices globally without hardware to install or software to maintain.
Top 10 favorite exploits of cyberattackers and how to stop them (on a budget)Duncan McAlynn, CEO, Operandis[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]60 mins