New Year, Same Breaches

Logo
Presented by

Jane Grafton, VP of Marketing

About this talk

In this webinar we’ll review the top data breaches that occurred during the first quarter of 2021. Perhaps predictably, attackers are using the same tactics to breach corporate networks they've been using for years: phishing, social engineering, ransomware attacks, third party vectors, unpatched systems, unintentional misconfigurations, and more. In parallel, cyber crime has evolved in the underground to the level of a commodity business that follows the same Something-as-a-Service model we see across the commercial software space. Attackers have become increasingly sophisticated and tenacious. Recent attacks against major vendors and government agencies have shown just how capable some of these well-resourced attackers can be. Join us for a deep dive into the types of cyberattacks we're seeing, how they are evolving, who is being targeted, and what you can do to detect and prevent them. It's a constant game of cat and mouse and our hope is that companies can be victorious against cybercriminals once and for all! It is possible... with the right cyber defenses.
Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (86)
Subscribers (6760)
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.