Hi [[ session.user.profile.firstName ]]

A Glimpse of Ransomware Resurgence: A Perspective From Incident Responders

Ransomware has been an increasing threat for small to large organizations. Tune in to discover what our professional Incident Responders have seen over the past 24 months. We uncover a glimpse of ransomware attack trends, targeted APAC industries, malware types and infamous root causes that have lead to ransomware compromises. We will also show how our experienced IR team can help you be proactive instead of reactive against these notorious infections in the digital world.
Recorded Aug 10 2021 38 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Desmond Ngu
Presentation preview: A Glimpse of Ransomware Resurgence: A Perspective From Incident Responders

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Application Containment: Taking Control Back from Rogue Applications Recorded: Sep 28 2021 26 mins
    Guy Rosefelt
    Users want to access the internet for personal use regardless of corporate or organizational internet access control polices. They will install unauthorized VPN programs or other applications (like anonymous browsers with TOR access, proxy avoidance software, etc.). But doing so brings great risk to your organization with 350,000 new malware variants discovered daily and malware detection being only 99.5% successful; 1750 new malware variants have the potential of breaching your organization every day.

    Sangfor takes application control to the next level with XDDR Application Containment by integrating and correlating endpoint, container, or workload application behavior with their activities on the network. Application Containment coordinates Sangfor NGAF, IAG and Endpoint Secure responses to provide real-time blocking and monitoring of unapproved or malicious applications.

    Find out how Sangfor Application Containment lets you take back control from rogue applications delivered by ransomware, malware and APTs that users brought into your network and block users from bypassing your internet access control policies, preventing them from doing it again.
  • Choose the Right Technology: Critical Cloud Adoption Considerations Recorded: Sep 23 2021 24 mins
    Lee YK, Sangfor Industry Solution Expert and Consultant.
    CIOs are leading the C-Suite digital transformation acceleration trends, forcing other C-Suite members to optimise and transform. CIO's are increasingly looked too to enable an organisation for future success.

    Cloud adoption is essential to the process of digitisation, but how can you make a cloud transformation as simple as possible? It is essential consider several elements of this process before you can choose the right technology for your cloud transformation journey. Join Sangfor experts in a candid discussion of the right technology to use to enable critical cloud adoption in 2021.
  • Using AI to Combat AI - Featuring Gartner Research on NDR Recorded: Sep 14 2021 45 mins
    William Phuah
    Weaponized AI is becoming a major threat, with cyber criminals leveraging AI to make cyber-attacks more effective and more disruptive, circumventing many threat detection technologies available on the market. While the best way to overcome this threat is to use AI, generalized AI models often result in a large number of false positives or false negatives, making it ineffective against weaponized AI.

    Sangfor recently released a whitepaper co-hosted with a Gartner research focus on AI for malware detection, that provides a brief overview of how Sangfor Cyber Command NDR platform utilizes purpose-built AI models to combat weaponized AI, and the primary threat hunting use cases the AI models detect. Join us in this webinar to learn about these AI-assisted use cases to better protect your organization against current & future cyber threats.
  • The New Era of Application Architecture: Microservice Recorded: Sep 7 2021 41 mins
    Cheney Hu
    Applications are playing a vitally important role in digital transformation. It is the driving force that moves business towards digitalization. We’ve been using all kinds of applications since the explosion of information technology, in businesses and daily life. The architecture of applications is also evolving to serve businesses of all kinds in accordance with technology advancement. From traditional monolith to distributed microservice, the difference in architectures defines the user experience, operability and availability of applications. That’s why it’s essential for IT decision makers to understand the value and benefits of the trending architecture for applications and choose the right application architecture for their businesses. Join us in this webinar to discover future of modern application architecture: microservice, and the value it brings to your business.
  • Re-Thinking a Cloud-Smart Strategy Recorded: Sep 1 2021 33 mins
    Francis Tsang. Senior Managed Cloud Operations Manager.
    Cloud has become the foundation that enables businesses to transform, differentiate and gain competitive advantage. Many organizations are now focused on cloud-first strategies, using cloud services to drive business.

    However, “Cloud first” does not always mean “Everything to Public Cloud!” or adopting a strategy to move all applications out of data centers.

    Being cloudified is easy. Creating a sensible, high-performance, cost-effective and secure enterprise cloud presence, is not so easy. Let’s explore a “Cloud Smart” strategy, a smarter way to re-define cloud adoption.
  • Work from Home: Staying Safe and Away from Cyber Threats Recorded: Aug 24 2021 30 mins
    Steven Tsui
    The global pandemic has made Work from Home (WFH) the new normal. While staying at and working from home keep us safe from COVID-19, in the cyber world as long as there is internet, security threats never go away even if we lock ourselves in our room. Recent research shows that security risks driven by work from home are still rising. Join us and learn about critical security risks stemming from WFH, suggested best practices to minimize these risks, and how Sangfor security solutions help you deal with risks turned threats.
  • Sangfor HCI in Discrete and Process Manufacturing: Changing with the Times Recorded: Aug 19 2021 30 mins
    Tian Koon Lee. Manager, Global Business Solution Strategy
    The concept of digitalization or Industry 4.0 has varying importance in existing manufacturing industries. During the global pandemic, some industries have embraced the concept and adopted digitalization, benefiting from more streamlined transactions, refined product delivery, and enhanced internal and external value chains, while others industries are struggling to encash the opportunities presented by digital transformation.

    Join our webinar now to learn how Sangfor HCI enables manufacturers to build smart, modern and future-proof factories.
  • A Glimpse of Ransomware Resurgence: A Perspective From Incident Responders Recorded: Aug 10 2021 38 mins
    Desmond Ngu
    Ransomware has been an increasing threat for small to large organizations. Tune in to discover what our professional Incident Responders have seen over the past 24 months. We uncover a glimpse of ransomware attack trends, targeted APAC industries, malware types and infamous root causes that have lead to ransomware compromises. We will also show how our experienced IR team can help you be proactive instead of reactive against these notorious infections in the digital world.
  • Microservice, Container, Kubernetes & The Future of PaaS Recorded: Aug 3 2021 34 mins
    Cheney Hu
    Living in a digital world means information is always at your fingertips, residing in the applications on your phones, laptops and servers. As speed and availability of information access requirements get higher and more complex, applications must evolve to stay current.

    Rapid changes in application architecture have seen applications morph from more traditional, monolithic applications with functional modules built into a single installation, to modern microsevice-based applications, that break into multiple installations, that more easily serve a wider user base. The future surely belongs to microservice-based applications, as unlike monolithic applications that are designed to run on physical servers or VMs, micro-service applications can be run on containers, and are managed by Kubernetes (K8s in short). To build, run and manage container-based microservices, you will certainly deal with K8s.

    As the first graduated open-source project from CNCF, K8s are the core of the platform-as-a-service that provides automation and orchestration for micro-service applications. Many tools like Jenkins and Istio are built around K8s, to facilitate simple and faster modern application development and management.

    As a long-time IaaS (HCI & SCP) player in the market, Sangfor dedicated an increasing amount of resources to PaaS development several years ago. Why are K8s so popular? And what is Sangfor’s role in the PaaS world? Join our Sangfor expert-led webinar to learn more!
  • Uncovering Telltale Signs of Ransomware with Continuous Threat Detection Recorded: Jul 27 2021 42 mins
    William Phuah
    Ransomware is one of, if not the biggest blight in this digital age. Many organizations are concerned about the negative impact a single ransomware attack will have on them and are doing all they can to prepare and to protect themselves for the eventual attack. However, while there are many variants of ransomware being developed every day, there are always telltale signs that can give you early warning of a ransomware threat coming your way.

    Join us and learn how you can identify these early warning signs with Sangfor’s Network Detection and Response platform, Cyber Command.
  • Sangfor Thailand International Roadshow 2021 Recorded: Jul 23 2021 139 mins
    Ratsakan Srisawat, Winyou Adisaktrakoon, Kraiphol Kulsirivuttichai, Pongpisit Laosuwanwat, Thuchapon Intaphrome
    We are in a constant state of virtual warfare, as threat from weaponized computer programs continues to increase steadily, raise its intelligence level, and stoop to new lows to take advantage of the digitally challenged. According to a recent study by IBM Security, data breaches cost the average company around $3.92 million, made possible by the average of 279 days businesses take to detect a data breach.

    Cloudification and Network Optimization have simultaneously expanded, with more than 75% of organizations indicating they are employing a cloud-first strategy, as reported by Gartner, giving businesses the tools to operate at a higher level – and giving cyber criminals the tools to penetrate and manipulate faster and easier than ever before. It is time to stop looking back at the grim statistics of 2020 and look forward to the trends of 2021. The Gartner report "Top Strategic Technology Trends for 2021" tells us that COVID-19 has disrupted the way organizations are working and must transform to meet trends such as remote work.
  • Disaster Recovery: Choosing the Right DR Plan & Security Solution Recorded: Jul 20 2021 28 mins
    Lee YK, Sangfor Industry Solution Expert and Consultant.
    Data protection and operational up-time are of critical importance since the pandemic, yet a recent study of over 500 C-level executives discovered that almost 80% of small and medium sized businesses have no data backup or disaster recovery (DR) plan in place. These networks are incredibly vulnerable to hardware failure, human error and malicious attack.

    Failure to plan, is a plan to fail. There are several considerations you must take into account when choosing and deploying a disaster recovery plan. Plan for the future safety of your organization now.
  • Insider Threat: US Supreme Court Drives Need for Zero Trust Network Access Recorded: Jul 13 2021 42 mins
    Guy Rosefelt
    The US Supreme Court ruled that interpretation of the United States Computer Frauds and Abuses Act of 1986 (CFAA) related to anyone who "intentionally accesses a computer without authorization or exceeds authorized access," was too broad and overreaching. Thus, anyone who has authorized access to computers and data cannot be held criminally liable for misuse of those resources or data. This now makes it very difficult for organizations to prosecute insider threat attacks. Organizations now need to implement and enforce ZTNA to ensure no one has more access than they need to resources or data. ZTNA limits and audits authorized access making it easier to take action against inside attackers.

    In this webinar, we will discuss the US Supreme Court decision, how it affects you and how ZTNA can help you protect against insider threats.
  • Move to a Suited Cloud for Your Applications and Data Recorded: Jul 6 2021 23 mins
    Francis Tsang. Senior Managed Cloud Operations Manager.
    The pandemic has dramatically changed our lives, and the global business landscape. Customer behavior has also experienced an permanent shift. This means that organizations need an enhanced their approach to transformation, to ensure they have the agility to reinvent themselves in extraordinary times.

    Sangfor is here to show you how to break down silos and drive digital transformation with optimal TCO control, while debunking myths of the complexity of adoption of emerging technologies. Cloud Computing as-a-service suits application needs and secures data, making your network agile yet focused, and helping put strategies in place that can evolve quickly, and deliver growth in this post-pandemic era.
  • 3 Critical Steps in Your Distributed Enterprise Protection Strategy Recorded: Jun 29 2021 46 mins
    Allen Lim
    While traditional WAN topographies are still widely in use, they cause several issues to organizations focused on securing branch offices.
    • Multi-point solution increases O&M complexity & cost
    • Lack of end-to-end security visibility
    • Difficulty defending against advanced persistent threat targeting branch offices

    Branch offices are often the weakest link in your strategic cyber defense plan, yet vital to organizational level network security protection. An unexpected cyber-attack could launch your business, head-first, into the worst-case scenario, making the creation of an incident response plan a critical part of your business continuity plan.

    Join Sangfor experts for today's webinar covering:
    • Managing branch offices effectively & securely
    • Offload SecOps to a trusted managed service provider
    • Incident Response best practices
  • It’s Time to Upgrade Your IT Infrastructure!...What next? Recorded: Jun 22 2021 36 mins
    Tian Koon Lee. Manager, Global Business Solution Strategy
    IT infrastructure is a vital part of any size business, and has a huge impact on operations and company success. It’s vital to have a secure and efficient infrastructure to keep up with constant changes in business, technology and best practices. Upgrading your IT Infrastructure can be a daunting task. How do you know when it’s the right time to upgrade, and how to get started? Join Sangfor experts for a webinar, where we will conduct an in-depth discussion of warning signs that it’s time to consider upgrading your company IT. Sangfor HCI is the solution you need to effectively build a simple, secure, reliable and cost-efficient IT infrastructure for your business.
  • Lessons Learned From Data Breaches to Better Protect Yourself Recorded: Jun 15 2021 46 mins
    Eugene Yew
    Cyberattacks occurs every 39 seconds globally and many are successful. Data breaches continue to affect hundreds of millions of customers causing them to lose trust in the businesses where personal information was compromised. It is vital for executives, managers, and line personnel to understand how data breaches occur and what can be done to prevent them.

    In this webinar, we will revisit some of the most interesting recent data breaches and discuss lessons learned to better protect your organization from them happening to you.
  • Sangfor International Roadshow 2021 - Indonesia Recorded: Jun 15 2021 167 mins
    Indra Lesmana/Victor J. Ferdinandus, Senior Presales Manager. Steven Tanuwijaya, Deputy PreSales Director.
    Sangfor International Roadshow 2021 - Indonesia
  • Building Proactive Closed-Loop Defenses Recorded: Jun 8 2021 31 mins
    Steven Tsui
    Today’s cybersecurity landscape is dire: externally, innumerable attackers with sophisticated skills and weaponized AI, and internally our cyber assets growing rapidly while becoming more difficult to protect. Unfortunately, even though most organizations use traditional architectures with best-of-breed products to build their defenses, the results are often insufficient. As good as best-of-breed products are, they do not integrate well. Breaches happen constantly, ransomware still gets through, and worse the security team is often reactive and has difficulty identifying the root cause of an event, let alone develop a strategy to prevent it from happening again. A closed-loop system is need where security products are integrated directly to better identify new AI-based threats and coordinate response against them.

    Sangfor NGAF is the foundation for building a proactive closed-loop security solution. Sangfor not only offers world-class battle-tested security protection but provides a straightforward way to identify and manage the sprawl of cyber assets, detect account abuse, and discover malicious processes and connections on critical business assets. Preemptively eliminate threats before they do damage.

    Join this session to see how Sangfor NGAF works together with Endpoint Secure, and Platform-X to build a dynamic proactive closed-loop defense against today’s advanced cyberthreats.
  • Avoiding Malware Reinfection - Finding Asymptomatic Infection & Patient Zero Recorded: Jun 1 2021 19 mins
    Zoppo Chen
    In the governance of network security, we can isolate and deal with cyber threats with obvious symptoms, but it is hard for us to find the root cause of asymptomatic threats, so extermination cannot be guaranteed. If you lack the ability to hunt Patient Zero, the weaknesses in that system will always be the entry point for future threats. If you cannot detect an asymptomatic hidden threat, it can spread across the network and gradually open other breaches until your organization suffers the same kind of security incident again and again. According to the IBM 2020 Cost of a Data Breach Report, the average total cost of a data breach reached 3.86M USD, and the average time to identify and contain a breach increased globally from 197 to 280 days. If asymptomatic hidden threats are already inside your network, how do you stop them before they cause damage to your business? How do you avoid reinfection by same virus? Join us and find out how to locate asymptomatic infection and Patient Zero.
Live & On-Demand Webinars Focus on Cyber Security & Cloud Computing.
Sangfor Technologies is a leading vendor of Network Security, Cloud Computing and Infrastructure solutions. Our Webinar Series are designed to educate current & new customers about the Latest Trends in Cyber Security & Cloud Computing. Stay tuned for more information about our upcoming webinars by visiting our website at www.sangfor.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Glimpse of Ransomware Resurgence: A Perspective From Incident Responders
  • Live at: Aug 10 2021 8:00 am
  • Presented by: Desmond Ngu
  • From:
Your email has been sent.
or close