Targeted Ransomware: Today’s Most Dangerous Threat to Organizations
Ransomware is the number one threat to enterprise environments. Today's attackers spend days or sometimes weeks in a target environment before executing a ransomware attack. When a human is performing a ransomware attack and is live on a victim's network, it requires a very different response.
No organization regardless of industry or geography is immune.
Join Dick O'Brien, principal research editor, and Jon DiMaggio, senior cyber intelligence analyst, to learn about Symantec’s research into the “on network” human-driven actions of several of the world’s most prolific ransomware attack groups.
You’ll learn about:
- The evolution of ransomware attacks
- New tricks that targeted ransomware attackers are using to extort victims
- Profiles of the world’s most insidious attack groups
- How your organization can best protect itself from these threats
RecordedNov 5 202039 mins
Your place is confirmed, we'll send you email reminders
In his first webinar in his Zero Trust series, Vadim Lander described the complete picture of a Zero Trust environment – the ultimate goal. In this webinar Vadim will go into detail of how it works in the context of API infrastructure with continuous analytics and authorization within every session. He will also cover how to bring it into your traditional IAM environment so it can benefit too.
Michael Dubinsky, Head of Cloud Network Security Product Management; Manoj Sharma, Leader of Symantec Technical Director Org
Many enterprises are embracing an all-in approach to digital transformation as prescribed in the SASE framework, while others want to adopt SASE but don’t know where to begin and need to do it at a measured pace. Others yet aren’t concerned about what you call it - they simply need to support a new remote working paradigm.
Fortunately, wherever they are in SASE maturity, there is a set of SASE truths that everyone needs to understand. Symantec has embraced SASE principles long before they had a name, and our subject matter experts understand these SASE truths as well as anyone.
Join Michael Dubinsky, Head of Product for Symantec Cloud Network Security Solutions and Manoj Sharma, Leader of Symantec Technical Director Organization as they provide insight into:
• Core use cases where adopting SASE can help you today
• Implementation strategies that maximize performance while reducing user friction
• The single platform approach and what other vendors aren’t telling you
• SASE maturity and finding the right path for your digital transformation
• A live demonstration of Symantec SASE capabilities
We will also set aside time after the presentation to address any questions you have.
Matt Willden, Intelligence Services Product Manager, and Tim Murphy, Network Security Product Marketing, from Symantec
Whether it’s WebEx, LinkedIn, GitHub, or a number of other SaaS applications, it’s becoming hard to imagine how we were once productive without them. However, there can be enormous risk if representatives of a company have unfettered access to these applications. Collaboration apps shouldn’t become unsupervised channels for information exchange. There can be an implied company endorsement when an employee “likes” social media content. Data leakage can happen when developers share information. While leading CASB solutions, like Symantec CloudSOC, can provide deep and broad control over a wide universe of applications, don’t overlook the functionality that can be delivered with your Symantec Secure Web Gateway (SWG).
Join Matt Willden, Network Security Product Manager as we demonstrate our latest SWG enhancements and look at:
• How your SWG can detect more than 35,000 applications that might be running on your network
• How to control those 35,000+ applications individually or collectively with controls for more than 250 application groups
• Applying security and compliance metadata for better policy governance
• Controlling specific activities for nearly 200 popular Collaboration, Social Media, and Developer applications
It’s not a full CASB. But if you spend some time, you just might find, you get what you need.
Register today, invite a friend and stick around till the end so we can answer your questions.
Sunil Choudrie, Product Strategy and Chris Newman, Product Manager, Symantec, Richard Hosgood, Dir. Engineering, Votiro
Now, more than ever, you have to trust your workforce. To support remote teams, organizations are making greater use of web-based applications, systems, and content portals. But trust alone isn’t enough to keep employees—and the organization—safe. Webpages carry risk of malware delivered through browser exploits, and can flip from good to bad in an instant. Even if the page is good, the contents may carry risk (e.g. web email or social media). And that’s before we even think about weaponized files that users might download from the web!
Telling your staff to not use the web or download files impacts both business productivity and morale. Instead, find out how they can safely browse the web and download files without risk of breach.
Join this webinar to learn:
• What webpage and file download risks you need to be most concerned about in 2021
• How Symantec Web Isolation keeps users safe
• The options available to design Isolation into your security system
• How Votiro technology integrates with Symantec Isolation to sanitize file downloads
Jon Oltsik, Senior Principal Analyst, Enterprise Strategy Group and Kyle Black, Technical Director, Symantec
Industry analysts have begun talking about Extended Detection and Response, or XDR, as an important security approach that helps streamline security operations centers (SOCs) with cross control visibility and intelligence and helps SOCs identify threats that would have otherwise gone undetected.
Threat detection and response is a core component of modern security programs, driving investment in tools to improve visibility, efficacy, and efficiency. As organizations commit to and extend EDR, NDR, or other security analytics solutions in support of broad threat detection and response programs, new opportunities arise for XDR.
Join us for a special webinar as we discuss Enterprise Strategy Group’s recently completed research on the impact of XDR on the modern SOC with Jon Oltsik, Senior Principal ESG Analyst and ESG Fellow.
Join us on January 13, 9 am PT (12pm ET) to hear what your peers are doing with XDR. In this webinar, you will learn the following:
• What organizations are looking from XDR
• The biggest challenge in deploying XDR
• The role a SIEM plays in XDR
• Whether XDR is real or just a trendy catchphrase
Sunil Choudrie, Product Strategy and Chris Newman, Product Manager, Symantec, Richard Hosgood, Dir. Engineering, Votiro
Now, more than ever, you have to trust your workforce. To support remote teams, organizations are making greater use of web-based applications, systems, and content portals. But trust alone isn’t enough to keep employees—and the organization—safe. Webpages carry risk of malware delivered through browser exploits, and can flip from good to bad in an instant. Even if the page is good, the contents may carry risk (e.g. web email or social media). And that’s before we even think about weaponized files that users might download from the web!
Telling your staff to not use the web or download files impacts both business productivity and morale. Instead, find out how they can safely browse the web and download files without risk of breach.
Join this webinar to learn:
• What webpage and file download risks you need to be most concerned about in 2021
• How Symantec Web Isolation keeps users safe
• The options available to design Isolation into your security system
• How Votiro technology integrates with Symantec Isolation to sanitize file downloads
Kevin Haley (Director of Security Response) and Dick O’Brien (Senior Research Editor) from Symantec, A Division of Broadcom
There is a single word that describes the threat landscape in 2020. Ransomware. There has been no bigger threat to a business or organization, or anything quite as profitable for cyber criminals in 2020. So, will that be the biggest threat in 2021? What else should security professionals be worried about?
It doesn’t take a crystal ball to know that Ransomware will still be big in 2021. But it’s sure to take some unexpected twists and turns. And we are certainly in for some other surprises. But, there are a number of things we feel pretty certain will happen in 2021.
Join Kevin Haley (Director of Security Response) and Dick O’Brien (Senior Research Editor) as they candidly discuss the future, including:
• New ransomware tactics they expect to see in 2021
• How attackers might exploit the “working from home” phenomenon more broadly
• New collaboration among cybercrime gangs
Michael Dubinsky, Head of Cloud Network Security Product Management; Manoj Sharma, Leader of Symantec Technical Director Org
Many enterprises are embracing an all-in approach to digital transformation as prescribed in the SASE framework, while others want to adopt SASE but don’t know where to begin and need to do it at a measured pace. Others yet aren’t concerned about what you call it - they simply need to support a new remote working paradigm.
Fortunately, wherever they are in SASE maturity, there is a set of SASE truths that everyone needs to understand. Symantec has embraced SASE principles long before they had a name, and our subject matter experts understand these SASE truths as well as anyone.
Join Michael Dubinsky, Head of Product for Symantec Cloud Network Security Solutions and Manoj Sharma, Leader of Symantec Technical Director Organization as they provide insight into:
• Core use cases where adopting SASE can help you today
• Implementation strategies that maximize performance while reducing user friction
• The single platform approach and what other vendors aren’t telling you
• SASE maturity and finding the right path for your digital transformation
• A live demonstration of Symantec SASE capabilities
We will also set aside time after the presentation to address any questions you have.
The concept of “Zero Trust” or “Trust but Verify” has been around for quite a while. But now, because of the expanding perimeter, API-driven architecture, IoT, and microservices, there is no way to accomplish this if it means manual intervention. But what does a Zero Trust architecture look like? What will happen if you use Zero Trust?
Join Vadim Lander, Symantec Identity Security CTO & Distinguished Engineer at Broadcom, where he will describe what a comprehensive Zero Trust environment needs to include to achieve your identity security goals without unnecessary disruption to your users, your developers, or your business processes.
Alan Hall, Symantec Product Marketing and Mitch Merrifield, Symantec Product Management
Your enterprise is vulnerable to increasingly sophisticated exploits. Increased exposure requires a new defense that combines prevention with more effective attack detection, analysis, and response.
Symantec Content Analysis uses a comprehensive approach to security that offers unequaled protection against known, unknown, and targeted attacks.
Join this webinar to hear from the Symantec Network Information Security team and hear what's new with Content Analysis so you can easily deploy Advanced Threat Protection across your enterprise - when and where you need it.
Gavin Fulton, Director, Endpoint Security Product Management, Symantec, A Division of Broadcom
Organizations around the globe are strengthening their Endpoint Protection Platforms and Endpoint Detection and Response to combat today’s ever expanding threats. Yet, many continue to be exploited by attackers’ use of the very tools and applications that they trust and utilize in their day-to-day business operation.
In this webinar, we will discuss the new feature updates Symantec is launching to provide more visibility into these activities and to protect your users and assets going forward. In this session, you will learn more about how these enhancements can help you to:
• Capture additional script information at runtime
• Block scripts, documents, and other non-executables
• Improve correlation and process lineage information
Kevin Haley (Director of Security Response) and Dick O’Brien (Senior Research Editor) from Symantec, A Division of Broadcom
There is a single word that describes the threat landscape in 2020. Ransomware. There has been no bigger threat to a business or organization, or anything quite as profitable for cyber criminals in 2020. So, will that be the biggest threat in 2021? What else should security professionals be worried about?
It doesn’t take a crystal ball to know that Ransomware will still be big in 2021. But it’s sure to take some unexpected twists and turns. And we are certainly in for some other surprises. But, there are a number of things we feel pretty certain will happen in 2021.
Join Kevin Haley (Director of Security Response) and Dick O’Brien (Senior Research Editor) as they candidly discuss the future, including:
• New ransomware tactics they expect to see in 2021
• How attackers might exploit the “working from home” phenomenon more broadly
• New collaboration among cybercrime gangs
The concept of “Zero Trust” or “Trust but Verify” has been around for quite a while. But now, because of the expanding perimeter, API-driven architecture, IoT, and microservices, there is no way to accomplish this if it means manual intervention. But what does a Zero Trust architecture look like? What will happen if you use Zero Trust?
Join Vadim Lander, Symantec Identity Security CTO & Distinguished Engineer at Broadcom, where he will describe what a comprehensive Zero Trust environment needs to include to achieve your identity security goals without unnecessary disruption to your users, your developers, or your business processes.
Gavin Fulton, Director, Endpoint Security Product Management, Symantec, A Division of Broadcom
Organizations around the globe are strengthening their Endpoint Protection Platforms and Endpoint Detection and Response to combat today’s ever expanding threats. Yet, many continue to be exploited by attackers’ use of the very tools and applications that they trust and utilize in their day-to-day business operation.
In this webinar, we will discuss the new feature updates Symantec is launching to provide more visibility into these activities and to protect your users and assets going forward.
In this session, November 17, 10 am PT, you will learn more about how these enhancements can help you to:
• Capture additional script information at runtime
• Block scripts, documents, and other non-executables
• Improve correlation and process lineage information
Saritha Chadalavada, Lead Product Manager and Sunil Choudrie, Product Marketing Manager, from Symantec, A Divison of Broadcom
Email is a leading threat vector being used to deliver malware, advanced threats and fraudulent content. Organizations are at high risk of financial loss as emails targeting their staff are used to defraud them. Join Saritha Chadalavada (Lead Product Manager, Email Security) and Sunil Choudrie (Product Marketing Manager) from the Symantec enterprise division of Broadcom, as they cover:
• The shift from malicious email to email with malicious intent
• Why many layers of protection are needed to defeat today’s complex attacks
• A simple to deploy technology that stops ransomware and phishing attacks
• The latest enhancements in Symantec Email Threat Analytics
Register today to see how the shifting trends in Email Security impact your organization.
Alex Campbell, Product Manager, and Tim Murphy, Product Evangelist, from the Symantec Enterprise Division of Broadcom
It goes without saying that the past year has produced some memories that none of us are likely to forget. But perhaps lost within the noise are significant advancements to the Symantec cloud-delivered Secure Web Gateway solution, Web Security Service (WSS). A year ago Symantec became part of the Broadcom family and now seems like a good time to pause and reflect on recent WSS achievements along with a glimpse of what’s ahead.
Join Alex Campbell, Product Manager for Symantec Web Security Service and Tim Murphy, Product Evangelist for Symantec SASE Solutions as they cover:
• Web Security Service innovation and recent enhancements
• WSS response to supporting a COVID-19 remote workforce
• New WSS network backbone
• A future built on a SASE foundation
• Coming attractions
• Answers to your questions
We look forward to this discussion and hope you will join us for the webinar and actively participate by submitting your questions and comments.
Dick O'Brien, Principal Research Editor Jon DiMaggio, Senior Cyber Intelligence Analyst from Symantec, A Division of Broadcom
Ransomware is the number one threat to enterprise environments. Today's attackers spend days or sometimes weeks in a target environment before executing a ransomware attack. When a human is performing a ransomware attack and is live on a victim's network, it requires a very different response.
No organization regardless of industry or geography is immune.
Join Dick O'Brien, principal research editor, and Jon DiMaggio, senior cyber intelligence analyst, to learn about Symantec’s research into the “on network” human-driven actions of several of the world’s most prolific ransomware attack groups.
You’ll learn about:
- The evolution of ransomware attacks
- New tricks that targeted ransomware attackers are using to extort victims
- Profiles of the world’s most insidious attack groups
- How your organization can best protect itself from these threats
Dick O'Brien, Principal Research Editor Jon DiMaggio, Senior Cyber Intelligence Analyst from Symantec, A Division of Broadcom
Ransomware is the number one threat to enterprise environments. Today's attackers spend days or sometimes weeks in a target environment before executing a ransomware attack. When a human is performing a ransomware attack and is live on a victim's network, it requires a very different response.
No organization regardless of industry or geography is immune.
Join Dick O'Brien, principal research editor, and Jon DiMaggio, senior cyber intelligence analyst, to learn about Symantec’s research into the “on network” human-driven actions of several of the world’s most prolific ransomware attack groups.
You’ll learn about:
- The evolution of ransomware attacks
- New tricks that targeted ransomware attackers are using to extort victims
- Profiles of the world’s most insidious attack groups
- How your organization can best protect itself from these threats
Saritha Chadalavada, Lead Product Manager and Sunil Choudrie, Product Marketing Manager, from Symantec, A Divison of Broadcom
Email is a leading threat vector being used to deliver malware, advanced threats and fraudulent content. Organizations are at high risk of financial loss as emails targeting their staff are used to defraud them. Join Saritha Chadalavada (Lead Product Manager, Email Security) and Sunil Choudrie (Product Marketing Manager) from the Symantec enterprise division of Broadcom, as they cover:
• The shift from malicious email to email with malicious intent
• Why many layers of protection are needed to defeat today’s complex attacks
• A simple to deploy technology that stops ransomware and phishing attacks
• The latest enhancements in Symantec Email Threat Analytics
Register today to see how the shifting trends in Email Security impact your organization.
Broadcom’s Symantec Enterprise Division, the global leader in cyber security, helps organizations and governments secure identities and information wherever they live. Organizations across the world look to Broadcom’s Symantec Enterprise Division for strategic, integrated solutions to defend against sophisticated attacks across endpoints, identities, and infrastructure, whether on-premises, in the cloud, or both.
Targeted Ransomware: Today’s Most Dangerous Threat to OrganizationsDick O'Brien, Principal Research Editor Jon DiMaggio, Senior Cyber Intelligence Analyst from Symantec, A Division of Broadcom[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]39 mins