InfoTechTarget and Informa Tech's Digital Businesses Combine.

Together, we power an unparalleled network of 220+ online properties covering 10,000+ granular topics, serving an audience of 50+ million professionals with original, objective content from trusted sources. We help you gain critical insights and make more informed decisions across your business priorities.

Emerging Threats: The Apps, Activities and Attacks Leading to the Most Data Loss

Presented by

Zoltan Deak, Director of Product Marketing, Rubrik; Salah Nassar, Sr. Director Product Marketing, Zscaler

About this talk

Join this webinar to learn about new strategies attackers are using to steal your most valuable asset - your data. We’ll examine the challenges of modern data security, including common vulnerabilities, emerging patterns, and the state of the modern threat landscape. Featuring research from Rubrik Zero Lab’s State of Data Security: the Hard Truths report and Zscaler’s ThreatLabz Data Loss Report.. Tune in and learn about: -> The apps, activities and attacks leading to the most data loss -> Our predictions for how threats will evolve -> Best practices to maximise your data security and hygiene -> Mitigating cyber risk for growing volumes of data in the cloud -> A solution for double extortion ransomware Make sure to take a look at the attachments as well - we've added extra learnings on how to optimise data protection and provided you with additional resources to help set you up for success.
Rubrik

Rubrik

21697 subscribers142 talks
Zero Trust Data Management Webcasts For IT Professionals
What is Zero Trust Data Management? An estimated 2 out of 3 ransomware attacks now target backups. That’s why it’s vital to ensure your backups are 100% protected and resilient. With zero trust data management no one is trustworthy. No user. No application. No device. To meet this new standard, data must be natively immutable so that it can never be modified, encrypted, or deleted by ransomware. Data needs to be ready at all times so you can recover what you need, and never pay a ransom.
Related topics