InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

How to Defend Against Supply Chain Ransomware Attacks like Kaseya

Presented by

Deepen Desai ,Chief Information Security Officer, Zscaler and Amit Banker Director, Security Research, Zscaler

About this talk

The recent Kaseya supply chain ransomware attack serves as the latest reminder that even the most widely trusted tools and partners in an IT environment can quickly become vulnerabilities. The only way to mitigate this risk is to build controls based on zero trust principles such as access control, traffic inspection, and identity-based microsegmentation. As we continue to see an escalation in both supply chain and ransomware attacks, zero trust is the most effective way to reduce business risk - from every attack - unlike traditional network security approaches that leave the front door open to threats from trusted sources. Join Zscaler CISO Deepen Desai as he breaks down the Kaseya attack. Attend this webinar to learn: 1. Background on the REvil ransomware group and how their attack worked 2. Best practices for safeguarding your organization against supply chain and ransomware attacks using the principles of identity and zero trust 3. How the Zscaler Zero Trust Exchange prevents compromise, lateral movement, and data loss to disrupt every stage of an attack and protect your organization
Zscaler

Zscaler

32815 subscribers252 talks
Zero Trust + AI: Protecting What Firewalls Can't
Traditional firewalls, VPNs, and public point solutions for data security are failing in the AI era, because they expand your attack surface and allow lateral threat movement. The Zero Trust Exchange delivers a new approach that eliminates the concept of implicit trust, operating on the principle: Never trust, always verify. It delivers zero trust architecture as a service from a resilient, cloud-native AI cybersecurity platform. Acting as an intelligent switchboard to enable Zero Trust Everywhere, it provides secure, any-to-any, zero trust communication that uses business policies, not networks, for all of your workforces, branches, and clouds. The platform, built upon the Zero Trust Architecture and AI foundation, provides five integrated solutions: Cyberthreat Protection, Data Security, Zero Trust Branch and Cloud, and Security Operations.
Related topics