Hi [[ session.user.profile.firstName ]]

Three Steps for Building a Successful Brand Protection Strategy

Technological approach for building digital brand protection strategy helps brand holders to minimize the potential risk to hard-earned reputation, revenues and, what is more important, customer trust.

Fraudsters exploit new schemes and up-to-date technologies to impersonate brands and steal money from companies and their clients. In this regard we have identified three key elements that make online brand protection strategy sufficient and effective.

From the webinar you will also learn about:

- Fighting against counterfeiting and cyber-attacks on brands’ reputation;
- Leveraging technology to combat online brand infringements;
- Fraudulent schemes against foreign brands in Russia and CIS markets in 2018.
Recorded Aug 16 2018 40 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Igor Stolyarov, Head of Global Development | Brand Protection
Presentation preview: Three Steps for Building a Successful Brand Protection Strategy

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Incident Response Preparedness: a hard look at the statistics Recorded: Apr 17 2019 33 mins
    Sergey Nikitin, Deputy Head of Forensics Lab, Group-IB
    In 2018 we inspected over 100 companies on preparedness for incident response and are ready to share the results of our assessment.

    Join the webinar to find out:
    - typical problems identified in organizations from different industries,
    - unusual solutions from clients' practices,
    - how to improve your readiness to respond to emerging types of incidents via cybersecurity services.
  • Red Team versus Pen Test Recorded: Apr 16 2019 41 mins
    Nicholas Palmer, VP of International Business, Group-IB
    Adversaries are probing your networks on a daily basis in order to find a way in.

    An organization that can withstand an intelligence-led, extended simulated attack will have the confidence that it is ready to prevent against the modern day adversary.

    Request our webinar recording to learn:

    - How Red Teaming is actually different from pen testing;
    - Real-world examples of Red Team engagements;
    - Cybercriminals’ primary tools, techniques, and procedures;
    - Key benefits of a Red Team exercise for your company.
  • How to Choose a Sandbox: Do's and Don'ts Recorded: Apr 9 2019 80 mins
    Nikita Kislitsin, Head of Network Security Department, Group-IB
    As cybercriminals create and modify advanced attack tools, a sandbox solution has become an essential part of an organization’s security toolset.

    Sandboxes analyze suspicious objects in a secure environment to prevent infections caused by spear-phishing emails, or previously unknown malware or tools.

    When it comes to choosing a sandbox, you need one that will detect real threats in the wild, not just perform well in a lab.

    This webinar covers practical use cases on how to choose a sandbox and avoid common testing mistakes.
  • An inside look at prevention and investigation of ransomware attacks Recorded: Mar 7 2019 49 mins
    Oleg Skulkin, Senior Digital Forensic Analyst, Group-IB, GCFA, MCFE, ACE
    Like many other threats, malware evolves over time. Modern ransomware programs make it impossible to decrypt data without the relevant decryption key, and their distributors’ intent is not merely to infect the target with malware a single time, but also to study the IT infrastructure for future targeted attacks, in most cases, espionage or data theft.

    Is ransomware an actual threat for your organization? Should such attacks be investigated? How to prevent them? These and other questions will be answered in this webcast.

    Join the webcast to learn more about:
    • Ransomware initial infection vectors and spreading over a network
    • Responding to ransomware attacks
    • Forensic analysis of infected hosts
    • Preventing ransomware attacks
  • Red Team versus Pen Test Recorded: Nov 29 2018 42 mins
    Nicholas Palmer, VP of International Business, Group-IB
    Adversaries are probing your networks on a daily basis in order to find a way in.

    An organization that can withstand an intelligence-led, extended simulated attack will have the confidence that it is ready to prevent against the modern day adversary.

    Request our webinar recording to learn:

    - How Red Teaming is actually different from pen testing;
    - Real-world examples of Red Team engagements;
    - Cybercriminals’ primary tools, techniques, and procedures;
    - Key benefits of a Red Team exercise for your company.
  • Mobile Fraud Trends and Best Practices in Protecting Banking Apps Recorded: Nov 8 2018 27 mins
    Denis Maslennikov, Anti-fraud expert, Group-IB
    According to High-Tech Crime Trends 2018 research, in 2018 we saw the emergence of new malware and distribution models, as well as the disappearance of some of the Android Trojans.

    It's expected that Android banking Trojans will continue to take over the global market, pushing PC banking Trojans to the backseat.

    Request our webinar recording to learn:

    - Mobile threat trends 2018;
    - How to prevent mobile banking app fraud;
    - Group-IB Secure Bank case study: How to detect cross-channel and cross-banking attacks using mobile SDK.
  • How to Choose a Sandbox: Do's and Don'ts Recorded: Aug 17 2018 81 mins
    Nikita Kislitsin, Head of Network Security Department, Group-IB
    As cybercriminals create and modify advanced attack tools, a sandbox solution has become an essential part of an organization’s security toolset.

    Sandboxes analyze suspicious objects in a secure environment to prevent infections caused by spear-phishing emails, or previously unknown malware or tools.

    When it comes to choosing a sandbox, you need one that will detect real threats in the wild, not just perform well in a lab.

    This webinar covers practical use cases on how to choose a sandbox and avoid common testing mistakes.
  • Three Steps for Building a Successful Brand Protection Strategy Recorded: Aug 16 2018 40 mins
    Igor Stolyarov, Head of Global Development | Brand Protection
    Technological approach for building digital brand protection strategy helps brand holders to minimize the potential risk to hard-earned reputation, revenues and, what is more important, customer trust.

    Fraudsters exploit new schemes and up-to-date technologies to impersonate brands and steal money from companies and their clients. In this regard we have identified three key elements that make online brand protection strategy sufficient and effective.

    From the webinar you will also learn about:

    - Fighting against counterfeiting and cyber-attacks on brands’ reputation;
    - Leveraging technology to combat online brand infringements;
    - Fraudulent schemes against foreign brands in Russia and CIS markets in 2018.
Intelligence-driven Cyber Security
Group-IB is a leading provider of solutions aimed at detection and prevention of cyber attacks and online fraud, and IP protection.

GIB Threat Intelligence system was named one of the best in class by Gartner, Forrester, and IDC. Group-IB’s technological leadership is built on company’s fifteen years of hands-on experience in cybercrime investigations all over the world and 55 000 hours of cyber security incident response accumulated in the largest forensic laboratory in Eastern Europe and a round-the-clock centre providing a rapid response to cyber incidents—CERT-GIB.

Group-IB is a partner of INTERPOL, Europol, and a cybersecurity solutions provider, recommended by SWIFT and OSCE.

Contact us at info@group-ib.com

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Three Steps for Building a Successful Brand Protection Strategy
  • Live at: Aug 16 2018 7:00 am
  • Presented by: Igor Stolyarov, Head of Global Development | Brand Protection
  • From:
Your email has been sent.
or close