Hi [[ session.user.profile.firstName ]]

Criminals Take Holidays! Understanding how Advanced Criminals Exploit & Succeed

Believe us. Criminals do take holidays. Albeit rarely but they are humans and they need to chillax too. Why do we bring this up? It's a serious topic. You need to understand your threat actors, your attacker profile before (repeat, before) you plan your detection and response strategies. There is no point in you going on holiday when the criminal is most active?

All of this and more boils down to situational awareness of your threats, the geopolitical environment (think about what is happening during the COVID19 crisis) and the threat actors that are after our critical systems, IP and data.

Join Amar Singh and guests as they have a candid and constructive discussion about
- Why you MUST identify your threat actors
- How some of the FAMOUS or rather infamous criminal gangs have operated in the past
– What you can do to mitigate the threat and how you can achieve this.
Recorded Jun 15 2020 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Amar Singh, David Lomax, Tim Condello and Martin Barrett
Presentation preview: Criminals Take Holidays! Understanding how Advanced Criminals Exploit & Succeed

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Cyber Security and Compliance Within the NHS Recorded: Oct 1 2020 72 mins
    Phil Howe CTO, Toby Newbatt Vectra AI, Dominic Ryder Vectra AI, Ben Hollands Pcysys and Nick Nieves Stealthbits
    Join us to take a closer look at the technologies used to address Cyber and Information Governance concerns within the NHS. Who better to take you through this journey than our new CTO who has first-hand experience of the benefits these solutions provide in a healthcare setting.

    This will be the first workshop ran by our new CTO, Phil Howe. Phil spent over 10 years as part of the senior management team within the NHS and we are very excited to have him on board.

    We will look closely at the capabilities of the three solutions in question, followed by a Q&A session for each.

    We will also discuss their impact in the following areas:

    Vectra, Network Visibility – Enabling the trust with the tools to provide real-time attack visibility. The ability to quickly and efficiently identify hidden cyber attackers within a network before they can cause irreparable damage.

    Pcysys, Security Validation – The ability to find and prioritise vulnerabilities across the entire IT network . Conducting continuous ethical exploits based on infrastructure vulnerabilities, to identify threat-based weaknesses.

    Stealthbits, Data Access Governance – Providing protection to sensitive data along with the credentials that hackers use to steal that data. Covering AD, file systems and shared areas Stealthbits, Data Access Governance – Providing protection to sensitive data along with the credentials that hackers use to steal that data. Covering AD, file systems and shared areas
  • LIVE WEBINAR: A Multi stage Live Cyber Attack Recorded: Sep 10 2020 59 mins
    Pavel Mucha
    Join us on Thursday 10th September at 11am to witness a live cyber-attack. Watch how a sophisticated attacker moves and see how world-class defenders can detect and stop the attack in its tracks!

    Hosted by cyber security specialists Cybereason, they’ll give you deep insight into the motivations, behaviours and strategies of the attackers, why current security approaches fail and how you can gain the upper hand.

    So, if you are responsible for protecting your organisation from cyberattacks, you don’t want to miss this!
  • Interview with a Hacker - How are Attackers Targeting Mobile Devices? Recorded: Sep 3 2020 61 mins
    Chris Hazelton, Nuno Povoa
    Every organisation today utilises mobile as a productivity tool by providing a full range of access to corporate resources for iOS and Android devices. With employees accessing O365, G Suite, Salesforce, and other services where attackers see an opportunity.

    Join Lookout and Eurofins to learn from the hacker's perspective:

    Why attackers are now relying heavily on mobile in their campaigns
    The methods that they utilise to compromise these devices
    What this means for your organisation
  • Remote work is here to stay. How do you get back to business? Recorded: Aug 25 2020 48 mins
    Whether you were ready or not, your organisation had to rapidly adapt to remote work as the coronavirus pandemic shut down office space around the world. While some economies are slowly opening up, it’s likely that many of your employees will choose to work from where they feel the safest – outside the office. In other words, remote work is here to stay.

    Your IT and security teams now have less control and visibility into your employees’ work environment and the risks involved. With your employees permanently working outside your office perimeter, you need to establish security measures that can continuously protect your data and your employees. Hybrid IT models will rise out of this shift and securing mobility will become more important than ever.

    Join us in our latest webinar to find out how you can permanently secure a remote workforce:

    How is work-from-home shifting to work-from-anywhere?
    How do you secure your workforce when they’re no longer inside your corporate network?
    How can mobile security help empower productivity amid work-from-anywhere?
    What organisations are doing to tackle remote work challenges?
  • Reduce Time to Detect and Respond to Threats By 93% Recorded: Aug 20 2020 55 mins
    Learn how customers who deploy the Cybereason Defence Platform can dramatically reduce the likelihood of a cybersecurity breach, significantly increase their security teams efficiency to detect and respond to cyber threats all while reducing the resources needed to manage the security platform.

    Cybereason commissioned Forrester Consulting to conduct a Total Economic Impact (TEI) study to quantify the benefits customers are able to experience by protecting their environment with the Cybereason Defence Platform, a complete endpoint protection platform.

    By using Cybereason customers are able to:

    Realise a 308% Return On Investment
    Gain better visibility into their endpoints and overall threat landscape, improving their security posture
    Improve in the efficiency to detect and respond to threats by 93%
    Reduce the time needed to manage the security platform by 75% via a single agent and single console
    Avoid expensive future security analyst hires, resulting in savings of more than $288,000 over three years.
    Please join our guest speakers to learn more about the key benefits to customers from the Forrester TEI study and how you can take advantage of key capabilities and features within the Cybereason Defence Platform to protect your enterprise from today’s cyber threats.
  • State of Ransomware Recorded: Aug 13 2020 61 mins
    Jim Hung, Assad Dahan
    Ransomware continues to evolve and despite what many in the industry had thought was a lull in the use of ransomware by cyber criminals; it hasn’t gone away and has returned with a vengeance. The “tried and true” source of revenue, projected at $17B in 2020, for cyber criminals now comes with capabilities and new tactics to ensure money is paid by the victims it has been inflicted upon.

    The Cybereason research team, Nocturnus, continues to follow the latest ransomware trends based upon what is happening in the underground and the Cybereason Incident Response team has first hand experience and lessons learned based upon what customers have encountered. Please join this webinar to get insights from Cybereason experts on the current state of ransomware and what you can do to prepare for the next ransomware attack.

    Some highlights of the ransomware discussion will include:

    Evolution of ransomware
    Current trends and new tactics
    Lessons from the field
    How to better protect your organisation from ransomware
    We look forward to having you attend this engaging and in-depth discussion with our experienced cyber security speakers. Be sure to register so you can gain a better understanding of what is happening with ransomware and how you can better protect your organisation from the latest ransomware attack.
  • The Real-world Business Impact of a Sophos Security System Recorded: Jul 30 2020 34 mins
    Sally Adam
    Customers running a Sophos cybersecurity system report a 90% reduction in day-to-day admin, and an 85% cut in security incidents requiring investigation. Join us for this informative webinar to learn about the real-world business impact of a Sophos system, and how you can enjoy efficiency and security savings like these. We’ll explore:

    • The Sophos cybersecurity system – what it is and why it’s different

    • Five real-world customer case studies

    • A tour of the Sophos security platform

    • How to get started
  • The State of Mobile Phishing Recorded: Jul 23 2020 36 mins
    Hank Schless
    The mobile security landscape is constantly evolving. With more reliance than ever on mobile devices for both personal and business use, the entire world is looking at mobile accessibility as the vehicle to higher connectivity and better productivity. Malicious actors have taken note of how reliant we are on mobile devices. From their perspective, mobile phishing is often the cheapest way to compromise an individual or an organization.

    Across all geographies and industries, there is a steady increase in the rate of both consumer and corporate users encountering mobile phishing attacks. The financial risk of falling victim to a phishing attack can be devastating to an organisation. For a large multinational company, they could be looking at hundreds of millions of dollars in losses from a successful phishing attack. Even for smaller organisations, like a regional healthcare system, the risk still falls in the tens of millions of dollars.

    Mobile phishing is a problem that can no longer be ignored, no matter what part of the world or industry an organisation operates in.
  • Evolve Your Cybersecurity in the Cloud Recorded: Jul 21 2020 46 mins
    Richard Becket
    A walk-through of the emerging challenges and solutions to securing data in the cloud.


    Richard Becket

    Recent high-profile incidents highlight how cyberattacks are moving to the cloud more and more, taking advantage of gaps in protection, team responsibilities, and cloud security knowledge.

    The need to fully understand the shared security responsibilities you have with cloud providers, and how Sophos solutions protect users, applications, and data across every cloud is more important than ever.
  • Endpoint Best Practices to Stop Ransomware Recorded: Jul 16 2020 38 mins
    Alex Gardner
    Join this webinar to hear from Sophos experts on the best practice measures you can take to protect yourself from ransomware attacks
  • Security and the Dark Web Recorded: Jul 1 2020 33 mins
    Peter Stewart
    What is the dark web? How do you access the dark web? These are just a few questions we will be covering in this webinar...
  • Reducing Threat Response Time Across The Network Recorded: Jun 30 2020 59 mins
    Martin Barrett, Nimrod Reichenberg, David Lomax
    Are you able to hunt for and rapidly contain sophisticated cyber threats across your network?

    Organisations spend valuable time and resource sifting through large volumes of log data which often does little more than create additional alerts for already overloaded security operations teams.

    It’s important that security teams leverage the right tools and technology to monitor their entire environment, while continuously applying specialised threat hunting techniques to detect and respond to attacks that have bypassed traditional controls.

    To be able to manage detection and response in the SOC, requires using AI and machine learning to investigate, auto contain threats, and orchestrate response. By utilising NDR, EDR and SOAR solutions, your SOC team will be able to provide threat intelligence, threat hunting, security monitoring, incident analysis, and incident response across the network.

    Join Martin Barrett, SE Manager, Cybereason, Nimmy Reichenberg, CMO, Siemplify, and David Lomax, SE Manager, Vectra on this webinar to understand more about how you can benefit by applying a Managed Detection and Response model, making your SOC team more efficient.
  • Exposing The Hype - How AI really benefits cyber security Recorded: Jun 25 2020 66 mins
    Richard Walters
    Artificial Intelligence promises to stop attacks, eliminate breaches, ensure compliance and address team fatigue – but is AI really shaping up to be the cure-all we were hoping for?
  • Ransomware Is Back With A Vengeance Recorded: Jun 25 2020 40 mins
    Seth Geftic
    Ransomware is living its best life, making headlines week after week. Two in three organisations fell victim to a cyberattack in 2018, which proves traditional anti-malware is not enough.

    Watch this session to learn:

    • The impact of ransomware on organizations
    • Common ransomware attack methods
    • How artificial-intelligence and EDR protect against the widest range of threats
  • Real -Time Threat Detection - Giving You The Gift Of Sight Recorded: Jun 25 2020 31 mins
    James Cunningham Core to Cloud , Malcolm Montague Information Security Manager NHS, Toby Newbatt Vectra
    Join us for our second NHS Guest Panel where we will be discussing the steps made to improve patient care through the strengthening of Cyber Resilience. We will look at the journey taken by East Lancashire Hospitals NHS Trust to enhance visibility across all attack Vectors (Including clinical devices and IoT).

    Areas of discussion will include…
    East Lancashire NHS Trust cyber challenges in their current environment
    Improving threat detection and investigation capabilities
    Bridging the growing cyber-skills gap and reducing the workload
    Why Vectra was the chosen cyber solution across the North West Region
    What benefits it brings during these unprecedented times
    How it complements existing Cyber tools for Automating response

    "You don’t know what you don’t know. I didn’t know what
    was out there. I didn’t know what was running across our network. I did not have visibility.
    Vectra opened my eyes."
    - Malcolm Montague, Information Security Manager at
    East Lancashire Hospitals NHS Trust
  • Managed Threat Response - Keeping The Human In The Loop Recorded: Jun 24 2020 46 mins
    Eric Kokonas
    Other managed detection and response (MDR) services simply notify you of attacks or suspicious events. Then it’s up to you to manage things from there.

    With Sophos MTR, your organisation is backed by an elite team of threat hunters and response experts who take targeted actions on your behalf to neutralise even the most sophisticated threats.
  • Best Practices for Uncovering Deeply Hidden Threats Recorded: Jun 24 2020 45 mins
    Eyal Gruner
    The question is not if you will be hacked, but when. Cynet CEO Eyal Gruner discusses how to detect the threats which have made it past the organisational security perimeter in this webinar.
  • Is your team safely working at home? Recorded: Jun 23 2020 22 mins
    Alexis Salour, Neil Nicholson, Jonathan Mcguigan, Gethin Jones
    In this webinar, we will go through the best practices an organisation can take to enable their employees to work safely from home during the outbreak without impacting the organisation’s security and productivity.

    • What are the potential risk that organisations are exposing to
    • How to review and enhance security policy around remote access to corporate data, at both ends of the connection
  • Taking Breach Protection Beyond the Endpoint Recorded: Jun 23 2020 45 mins
    Zeus Kerravala,& Yiftach Keshet,
    Advanced threats are on the rise. What’s the best way to know whether there’s an attacker in your network? Endpoint Detection and Response (EDR) platforms are a leading technology to achieve this task. However, organizations are now realizing that their actual attack surface is significantly wider than just the endpoints.

    Join Zeus Kerravala, founder and Principal Analyst with ZK Research, and Yiftach Keshet, Director of Product Management at Cynet, in this Webinar, as they uncover the limitation in the endpoint-only security mindset. Zeus will share his vision on XDR: a new type of platform that expands beyond the endpoint to the next age of threat detection:

    Expanding the horizon beyond the endpoint
    Critical activity data that can boost threat detection capabilities
    A new perspective on organizations’ attack surface
    Multi-stage attacks and threat vectors analysis
  • Incident Response Recorded: Jun 23 2020 38 mins
    Jon Niccolls
    At any moment, day or night, your organisation can be victimized by devastating cybercrime. You can’t predict when cyberattacks will happen, but you can use proactive incident response to quickly mitigate its effects or prevent them altogether.
Bringing you the best in security and compliance
At Core to Cloud we pride ourselves on being a different type of solutions provider. We have in-depth industry experience, with a strong focus on security, compliance and the cloud. This channel is for anyone who is passionate about Cyber Security and how we can better equip ourselves.

Whether you’re looking at ways intruders can get into your network, the security of your devices, the safety of your data or offering training to make your team a stronger line of defence – we’ve trialled the best technologies on the market in a variety of environments.

Our channel will include educational panel debates, industry expert speakers, our customer reviews, technology demos and much more. We hope you enjoy our channel - a place for us all to learn from each other.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Criminals Take Holidays! Understanding how Advanced Criminals Exploit & Succeed
  • Live at: Jun 15 2020 10:00 am
  • Presented by: Amar Singh, David Lomax, Tim Condello and Martin Barrett
  • From:
Your email has been sent.
or close