Hi [[ session.user.profile.firstName ]]

Anatomy of a Ransomware Attack

Did you know that just opening a compromised web page could allow dangerous code to install on a PC or smartphone? You don’t have to click “accept” for a download or software update to install malware on your machines and trigger an infection and the consequences can be enormous.

Why you need to build 24 X 7 threat monitoring into your environment
Ransomware is an extremely profitable type of attack. It only takes one network-connected device to expand a malware infection and hold an entire organization hostage for profit. Last year, the use of encryption as a weapon to hold companies’ and individuals’ critical data hostage grew by 35 percent.

- Learn from our cyber security experts about what can happen in a ransomware attack, based on real-life events.

-Understand how the malware entered the IT infrastructure of two different companies, and find out how long it stayed and the impact to these businesses.

-Will show you how attacks are identified and remediated, as well as some best practices for handling ransomware attacks, should one occur in your company.

Improve your line of defense against ransomware and minimize the loss of key data, money and intellectual property from your organization.
Recorded Oct 18 2016 62 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dennis York, Lead Incident Response Investigator, Symantec and Darian Lewis, Senior Principal Security Analyst, Symantec
Presentation preview: Anatomy of a Ransomware Attack
  • Channel
  • Channel profile
  • Secrets Revealed: Effective Protection Against Ransomware Jan 18 2018 6:00 pm UTC 60 mins
    Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • GDPR Compliance: Maintaining Security in the Cloud Jan 11 2018 6:00 pm UTC 60 mins
    Security is a gating factor to cloud adoption that continues to hinder a businesses’ ability to maintain control and visibility across cloud applications. With increased compliance regulations such as PCI, HIPAA, and GDPR, is it truly possible to maintain compliance in the cloud?

    Symantec is offering an opportunity to hear first-hand the challenges businesses face when adopting the cloud and adhering to compliance regulations.

    Join us to learn how to enable safe cloud adoption while maintaining compliance.

    Key Takeaways:

    • How to address security and compliance challenges when migrating to the cloud

    • How to support GDPR compliance in the cloud

    • Leverage a single data protection solution for email, storage, network, endpoints, and cloud

    Register Today
  • Defense Against a Ransomware Attack: Latest Research and Best Practices Dec 12 2017 6:00 pm UTC 60 mins
    Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec
    On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.

    It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.

    The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.

    The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.

    Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:

    1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.

    2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.

    3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.

    Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.

    Register Today
  • The 5 Essentials of Every Next-Gen SOC Dec 7 2017 6:00 pm UTC 60 mins
    Matt Mosley, Director of Product Management, Cyber Security Services, Symantec
    Every cybersecurity organization is challenged with enabling the fast pace and nuances of their business strategy. Security measures must quickly keep up and be an enabler while continuing to mitigate the risks of a breach occurring.

    New technology adoption and expanded attack surfaces, evasive cyber threats, and limited budget and staffing resources make this challenging – there’s a lot to stay on top of.

    How does your Security Operations Center (SOC) keep up?

    Join us to learn how to scale and extend the capabilities of your SOC.

    We’ll review topics such as:

    - Automated security event analysis

    - Human security event analysis and prioritization

    - Threat visibility across key on-premise and cloud control points

    - Consumption of technical and strategic threat intelligence

    - Proactive threat hunting and incident response

    Register Today
  • TLS 1.3: the future is encrypted. Are your network security tools ready? Dec 6 2017 6:00 pm UTC 60 mins
    Tim Murphy, Sr. Manager, Network Product Marketing, Symantec and Bob Blair, Sr. Systems Engineer, SSL Visibility, Symantec
    Google recently announced that 71 of the top 100 sites are now using HTTPS, nearly double from a year ago. Accelerated adoption of strong encryption practices, including TLS 1.3, is good for consumers and enterprises alike. However, highly secure encryption also presents challenges for security professionals. SSL/TLS encryption is also becoming popular with cybercriminals, looking to hide malware and other advanced threats. Consequently, without a solution that enables secure inspection, many network security tools that address advanced threats will be blind to them. Join us in this webcast where we’ll look at:
    -Challenges of intercepting TLS traffic while maintaining high security
    -The Impact of TLS 1.3 and importance of preserving session integrity
    -Benefits of centralized encrypted traffic management
    -Architectural considerations before you deploy
  • Putting the NIST Cybersecurity Framework to Use in Your Healthcare Organization Dec 5 2017 6:00 pm UTC 60 mins
    Ken Durbin, CISSP Strategist, CRM & Threat Intel, Symantec and Geoff Cooke, Virtual CISO Services Consultant, CynergisTek
    Part 7 of 7: NIST Cybersecurity Framework for Healthcare Webinar Series

    The NIST CSF provides an excellent guide for healthcare organizations looking to improve their overall cybersecurity posture. Throughout our webinar series we’ve explored the intricacies of the framework to highlight what healthcare organizations really need to know, with a specific focus on the five core functional areas of the framework – IDENTIFY, PROTECT, DETECT, RESPOND, RECOVER.

    Join us for this final webinar as we wrap-up the main takeaways from the series, and also hear from experts who have incorporated the NIST CSF into healthcare environments, and the impact it has provided.

    Register Today

    To view on demand NIST Cybersecurity Framework for Healthcare Series Part 1-6 visit https://resource.elq.symantec.com/LP=4235
  • Your Proxy Just Got Smarter with Web Isolation Nov 30 2017 6:00 pm UTC 30 mins
    Timothy Chiu - Senior Director of Product Marketing, Symantec
    Did you know millions of hosts (Domains, Subdomains, or IP Addresses) pop up every day and many of these have lifespans of less than 24 hours.

    Many organizations choose to set Secure Web Gateway policies to block users from going to uncategorized sites because of the risk they represent, even though many may be legitimate destinations for business purposes.

    In a similar fashion, many enterprises choose to block sites that have a heightened risk rating, but are not conclusively risky. This leads to website over-blocking and unhappy end users. Some sites are known to be good, others are known to be bad, the problem comes for those in the middle where insight/information is lacking.

    Key Learning Objectives:

    •Learn about the world’s largest civilian threat intelligence service and how it will protect you from Malware attacks

    •Learn how to set policies to send any traffic with inconclusive risk or uncategorized by Global Intelligence Network down a Web Isolation path.

    •Learn how to boost productivity for businesses without incurring any additional risk.

    Register Today
  • GDPR, Analysis with Deloitte (Video) Recorded: Nov 16 2017 4 mins
    Symantec and Deloitte
    GDPR, Analysis with Deloitte (4 Min Video)
  • Symantec Endpoint Protection Mobile (Video) Recorded: Nov 15 2017 5 mins
    4 Min Product Demo Video

    Watch a demonstration of two iPhone hacks - malicious profiles and malware (spyware) - to see how a hacker can take full control of a device, steal credentials, control and manipulate communications, steal identities and remotely record conversations without detection.

    In each case, see how Symantec Endpoint Protection Mobile (SEP Mobile, formerly Skycure), the leading Mobile Threat Defense solution, protects the device and data from these attacks.
  • The Threat Landscape – Cybersecurity Trends in 2017 and Beyond Recorded: Nov 15 2017 59 mins
    Orla Cox, Director Development Symantec
    The last year has been dominated by costly attacks, newsworthy breaches ransomware and economic espionage. Cybercrime has gotten bigger and bolder and the financial rewards have gotten much bigger. Cyber attacks have started to become a regular occurrence in the news,. This webcast will review

    • Review the threat landscape of 2017
    • Who or what has been to blame in these ransomware and cyber attacks
    • What lessons can you the security professionals take from the year
    • What solutions can help secure you as we move into 2018.

    Register now
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Recorded: Nov 14 2017 61 mins
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.

    Attend this webinar, featuring guest Senior Analyst Chris Sherman of Forrester and Naveen Palavalli Director, Product & GTM Strategy of Symantec and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.

    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:

    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security

    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response

    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications

    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.
  • Introducing Endpoint Security for the Cloud Generation (Video) Recorded: Nov 8 2017 2 mins
    Introducing Endpoint Security for the Cloud Generation Video (2 mins)

    Advanced Single Agent Endpoint Seucirty - Multi layer defense protects both traditional and modern endpoints stopping them from getting in however they attack.
  • Endpoint Security for the Cloud Generation (Video) Recorded: Nov 8 2017 3 mins
    Adam Bromwich, SVP, Engineering, Symantec
    Review of Symantec Endpoint Security for the Cloud Generation (2 min video)

    Adam Bromwich, SVP, Engineering discusses how our Integrated Cyber Defense Platform consolidates functionality, both on prem and in the cloud, by sharing capabilities and telemetry to solve complexity
  • Symantec Endpoint Protection 'Deception' (Product Tour Video) Recorded: Nov 8 2017 4 mins
    Symantec Endpoint Protection (SEP) 'Deception' Product Tour Video (3 mins)
  • Symantec Endpoint Detection & Response (EDR) - ATP:Endpoint (Product Tour Video) Recorded: Nov 8 2017 4 mins
    Symantec Endpoint Detection & Response (EDR) - ATP: Endpoint Product Tour Video (3 mins)

    Symantec Advanced Threat Protection: Endpoint gives incident investigators the tools to expose, contain and resolve breaches resulting from advanced attacks
  • Symantec Endpoint Protection 14.1 (Product Tour Video) Recorded: Nov 8 2017 4 mins
    Symantec Endpoint Protection (SEP) 14.1 Product Tour Video (3 mins)
  • Official Launch of Symantec Control Compliance Suite 12.0 Recorded: Nov 2 2017 63 mins
    Vishal Gupta, VP Engineering, Symantec and Anand Visvanathan, Principal Product Manager, Symantec
    The release of Symantec Control Compliance Suite version 12.0 is here! Please join us for a special webcast on Thursday, November 2 to find out what’s new in this release and how it will better help you to:

    • Measure and prove compliance with security regulations, mandates, and best practices
    • Determine risk and prioritize remediation

    Don’t miss this great opportunity to get the latest news and information on Control Compliance Suite!
  • Data Loss Prevention (DLP) v15 - The Information Centric Security Generation Recorded: Nov 2 2017 47 mins
    Salah Nassar, Director Product Marketing, Symantec and Ben Yang, Director of Product Management, Symantec
    Symantec launched a major release for DLP, version 15, that focuses on expanding core DLP technology and Information Centric Security.

    In today’s cloud generation, data is shared through personal email, created and shared on cloud apps, and accessed via BYO devices by employees, partners, and vendors. With the persistent threat of a breach looming, maintaining visibility, protection, and control over your sensitive data is key for business and maintaining compliance.

    Join us on this webinar to review what’s new with Symantec DLP 15 and get first-hand view of the revolutionary Information Centric Security approach.

    Register Today
  • Protecting Critical Infrastructure from Cyber Threats Recorded: Oct 31 2017 31 mins
    Kunal Agarwal, GM Internet of Things, Symantec
    The systems that connect our lives like financial institutions, and transportation - are all dependent upon the internet.

    Building resilience in critical infrastructure is crucial to our national security.

    Join us as we examine cyber security in relation to keeping our traffic lights, running water, phone lines, and other critical infrastructure secure.

    It also facilitates the transition to November's Critical Infrastructure Security and Resilience Month (CISR), highlighting the tie between cybersecurity and our nation's critical infrastructure.

    Register Today
  • The Digital Workforce Wants YOU: Consider a Career in Cybersecurity Recorded: Oct 26 2017 31 mins
    Patrick G. Cohen, VP, Strategic Partnership from NPower Inc.
    According to a study by the Center for Cyber Safety and Education, by 2022, there will be a shortage of 1.8 million information security workers.

    Key influencers like teachers, parents, state and local officials are encouraged to join this webcast to learn more about this growing field and how to engage youth in pursuing cybersecurity careers.

    Register Today
Securing and Managing an Information-Driven World
Symantec is a global leader in providing security solutions to help our customers – from consumers and small businesses to the largest global organizations – secure their information against more risks at more points, more completely and efficiently than any other company. Our company’s unique focus is to eliminate risks to information, technology and processes independent of the device, platform, interaction or location.

Visit: http://www.symantec.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Anatomy of a Ransomware Attack
  • Live at: Oct 18 2016 5:00 pm
  • Presented by: Dennis York, Lead Incident Response Investigator, Symantec and Darian Lewis, Senior Principal Security Analyst, Symantec
  • From:
Your email has been sent.
or close