InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

The Pandemic and its Manipulation by the Cyber-Underworld

Presented by

Guy Propper, Threat Intelligence and Deep Learning Group Manager, and David Krivobokov, Threat Intelligence Team Leader

About this talk

Though the COVID-19 pandemic will hopefully soon be behind us, some of the changes caused by it are here to stay. Certainly, the cybersecurity attack landscape has changed due to the transition to WFH and the increased digital activity that has caused. But in addition to that, attackers who never miss an opportunity, have manipulated the pandemic, often making it the theme of their nefarious activities. To stay secure in this changing landscape, the cybersecurity arena must adapt to deal with these threats proactively. In this webinar, we’ll review how the coronavirus pandemic impacted the cyber-threat landscape in 2020. In this webinar you will gain: • Knowledge of how the rapid transition to work from home impacted enterprise cyber security • Insight on how hackers changed their ransomware campaigns to seize the opportunity created by the pandemic • Insight on how the COVID-19 pandemic contributed to new trends in spreading financial malware • Information on attacks targeting different operating systems • Access to Deep Instinct’s Cyber Threat Landscape Report
Deep Instinct

Deep Instinct

5024 subscribers53 talks
Fight AI with the best AI.
Deep Instinct, the first and only preemptive data security company built on a deep learning cybersecurity framework, prevents unknown threats in <20 milliseconds, 750X faster than the fastest ransomware can encrypt. Deep Instinct Data Security X (DSX) secures data at-rest or in-motion – across cloud, NAS, applications, and endpoints.
Related topics