Hi [[ session.user.profile.firstName ]]

Anatomia di un attacco di ransomware

Lo scorso anno il ransomware ha raggiunto un nuovo livello di evoluzione e pericolosità: come essere certi che l'infrastruttura IT sia protetta e in grado di affrontare un attacco?

Oggi i leader della sicurezza hanno importanti sfide da risolvere:
•Un’intelligence sulle minacce insufficiente a individuare gli aggressori e le campagne che potrebbero attaccare la loro azienda.
•La penuria di analisti di sicurezza competenti in grado di identificare il numero crescente di minacce che penetrano all’interno delle aziende. Nel 2015, ad esempio, l’uso del crypto-ransomware come strumento di aggressione è aumentato del 35%, ma le aziende aggredite impiegano ancora più di 200 giorni per accorgersi del problema.
•Scarsa conoscenza specializzata delle tecniche di incident response e remediation per gli ambienti IT colpiti.

Gli autori dei ransomware continuano ad affinare le proprie tattiche, e le aziende devono imparare a conoscere bene le nuove minacce. Partecipa al webinar Symantec che descrive un attacco di ransomware, le sue conseguenze e la strategia di remediation adottata dall’azienda colpita.
Recorded Sep 28 2016 64 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Antonio Forzieri, Global Cyber Lead & Gabriele Zanoni, Incident Response Investigator
Presentation preview: Anatomia di un attacco di ransomware
  • Channel
  • Channel profile
  • Ask the Experts—Securing Data and Email in Office 365 Oct 17 2018 5:00 pm UTC 60 mins
    Mark Bowker, Senior Analyst, ESG / Richard Diver,Cloud Security Architect. Insight/ Jereme Lee, System Engineer, Symantec
    Its your job to secure email, sensitive data and apps in Office 365. Now What?

    Moving to cloud applications provides the opportunity to get your security right. This is the time to set up optimum data loss prevention, malware and phishing prevention, and access controls on your systems. No matter if you are still planning, have just started, are in the midst, or are fully migrated to Office 365, there are security policies and procedures to implement and optimize.

    Join ESG industry analyst Mark Bowker, Insight’s Cloud Security Architect, Richard Diver, and Symantec’s System Engineering Manager, Jereme Lee to learn how to:

    - Get the most out of your Office 365 instance by enhancing the security

    - Understand what Microsoft offers and how Symantec compliments their security offering

    - Enhance your email, app and data security in Microsoft Office 365 which can be used across all your cloud apps

    Register Today
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Sep 27 2018 10:00 am UTC 75 mins
    Mike Chen, Tim Murphy, Robert Arandjelovic | Live Q&A with Karthik Ramakrishnan
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:
    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today to hear from Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic, Director Product Marketing. With a live Q&A from Karthik Ramakrishnan, Senior Systems Engineer, EMEA Emerging Markets
  • Unternehmen müssen sich vor einer Reihe neuer Angriffsvektoren schützen Sep 26 2018 9:00 am UTC 60 mins
    Andre Engel and Lars Kroll Symantec
    Cyberkriminelle und professionelle Angreifer investieren viel Zeit und Mühe, um neue Angriffspunkte zu identifizieren und bestehende Attacken zu perfektionieren. Seit WannaCry feiern zum Beispiel Würmer ein Revival – und breiten sich immer öfter aggressiv in Unternehmensnetzen aus. Da die Zahl der Schwachstellen auf Desktop-PCs stetig abnimmt, suchen die Angreifer verstärkt nach neuen Kanälen und Plattformen, um Systeme zu infizieren – und entscheiden sich zunehmend für IoT-basierte Tools.

    In diesem Webinar erfahren Sie:
    • Mit welchen neuen Angriffsformen sich Cyberkriminelle heute bereichern
    • Vor welchen neuen Angriffsvektoren sich Unternehmen schützen müssen
    • Welche Gefahren in IoT-Umgebungen drohen
    • Welchen gezielten Angriffen Unternehmen jüngst ausgesetzt waren
  • Tieniti informato sui recenti attacchi mirati e le minacce IoT di nuova generazi Sep 25 2018 10:00 am UTC 60 mins
    Sunil Venanzini, Symantec
    Le nuove metodologie per la propagazione delle minacce mettono le aziende sotto pressione

    Per garantirsi il successo, hacker e gruppi criminali che lanciano attacchi mirati continuano ad affinare le armi e identificare nuovi canali di infezione. Sulla scia di WannaCry, i worm riprendono virulenza e si diffondono aggressivamente nelle reti aziendali. Con le vulnerabilità sui computer desktop che si fanno sempre più rare, i criminali vanno in cerca di nuovi canali e nuove piattaforme da cui lanciare le infezioni: l’IoT diventa un bersaglio sempre più allettante.

    In questo webinar apprenderai:
    • Le strategie di diversificazione adottate dai criminali informatici per mantenere la redditività
    • Le nuove metodologie per la propagazione delle minacce, che mettono le aziende sotto pressione
    • La nuova generazione di minacce IoT
    • Le recenti campagne di attacchi mirati
  • Las nuevas formas de propagación de amenazas causan estragos a las empresas Sep 24 2018 12:00 pm UTC 60 mins
    Ramses Gallego, Strategist, Symantec
    Los nuevos métodos de la propagación de amenazas que están causando dolores de cabeza a las organizaciones

    Los cibercriminales y los grupos de ataques dirigidos continúan aprovechando los métodos actuales e identificando nuevos canales de infección para llevar a cabo su cometido. Siguiendo los pasos de WannaCry, los Worms están experimentando un resurgimiento y se están extendiendo con agresividad en las redes corporativas. Por otra parte, a medida que los equipos de oficina son cada vez más escasos, los atacantes necesitan buscar nuevos canales y plataformas de infección, como por ejemplo el IoT, que cada vez resulta ser una opción más tentadora.

    En este seminario web descubrirá:
    • Cómo se están diversificando los cibercriminales para seguir generando beneficios.
    • Los nuevos métodos de la propagación de amenazas que están causando dolores de cabeza a las organizaciones.
    • La nueva generación de las amenazas contra el IoT.
    • Las campañas de ataques dirigidos más recientes.
  • Solving Mobile Security: Peer-tested Strategies That Work Recorded: Sep 21 2018 61 mins
    Brian Duckering,Mobile Security Specialist, Symantec and Brian Jacome, Director of Applications and Controls, RBC
    Businesses of all sizes are wary of the added risk that comes from the use of mobile devices and are struggling to figure out the best strategies to protect their sensitive information.

    Attend this webcast to hear the advice from experienced security professionals who have successfully navigated the path to protect their businesses from mobile threats.

    Hear from Brian Jacome, Director of Applications and Controls from Royal Bank of Canada and learn about his journey and get answers to the following questions and more:

    - Why is it important to secure mobile devices?

    - What is your advice to your peers who are starting their mobile security journey?

    - What are the most important requirements of a mobile security solution?

    By the end of this webcast, you will have gained important advice and perspective from those who have gone before you and are able to sleep better at night.

    Register Today
  • Dans la foulée de Wannacry - nouvelles techniques & méthodes des cyber criminels Recorded: Sep 21 2018 37 mins
    Hervé Doreau, Directeur Technique, Symantec France
    Les cyber criminels continuent d'utiliser des méthodes éprouvées, en 'identifiant de nouveaux vecteurs d'infection pour augmenter le taux de réussite de leurs attaques ciblées. Dans la continuité de WannaCry, l'utilsation de vers connait un regain au sein des réseaux d'entreprise. Les vulnérabilités au niveau du poste de travail devenant néanmoins moins courantes, les attaquants doivent trouver de nouveaux vecteurs et plateformes d'infection : l'IoT est une option de plus en plus intéressante pour eux.

    Lors de ce webcast, vous en saurez plus sur :

    • la diversification des méthodes d'attaque vs leur profitabilité
    • les nouveaux modes de propagation, véritables casse-têtes pour les entreprises
    • les menaces IoT next-gen
    • les récentes campagnes d'attaques ciblées
  • Messaging Security - Schutz Ihrer E-Mail in der Cloud und vor Ort Recorded: Sep 19 2018 62 mins
    Ramin Ghassemi, Hakan Arslanboga
    E-Mail ist die Lebensader Ihres Unternehmens, aber auch eines der häufigsten Einfallstore für zielgerichtete Angriffe. Der Komfort, den Office 365, Gmail und andere cloudbasierte Produktivitätstools bieten, erhöht die Anfälligkeit Ihres Unternehmens. Schützen Sie es mit unserer Messaging Security-Plattform für cloudbasierte und On-Premises-E-Mail selbst vor den komplexesten Bedrohungen.  
  • How to protect against IoT security attacks and next generation cyber crimes Recorded: Sep 19 2018 43 mins
    Orla Cox, Director Security Response, Symantec
    Cyber criminals and targeted attack groups alike continue to hone existing methods and identify new channels of infection in order to ensure success. On the heels of WannaCry, Worms continue to experience a renaissance, spreading aggressively across corporate networks.

    As vulnerabilities on desktop computers become increasingly rare, attackers need to look to new channels and new platforms for infection, with IoT becoming an increasingly attractive proposition.

    In this webinar you will learn:

    • How cybercriminals are diversifying in order to remain profitable
    • The new methods of threat propagation causing headaches for organizations
    • The next generation of IoT threats
    • Recent targeted attack campaigns
  • SEP Mobile Overview Recorded: Sep 18 2018 3 mins
    Symantec
    Symantec Endpoint Protection Mobile's risk-based mobile security approach is designed from the ground up to defend against all detected threats that put business data at risk of exposure, theft and manipulation, while respecting users' need for privacy, productivity and a great mobile experience.Helps predict, detect and prevent physical, malware, network and vulnerability exploits to protect businesses from mobile cyberattacks.
  • Learn How the World Continues to Respond to GDPR Recorded: Sep 12 2018 56 mins
    Ken Durbin,CISSP Sr.Strategist,Global Gov't Affairs, Symantec & Robert Glaser, Sr. Mgr. Privacy, Deloitte & Touche LLP
    Join us for a webinar on September 12th, as experts from Symantec and Deloitte discuss the impact of the first few months of GDPR. For two years, companies have had the May 25, 2018 GDPR date in the forefront of their planning. However, the scope of this game-changing policy has left over 80% of organizations feeling inadequately prepared.

    In this webinar you will:

    • Discover why protecting data is the best response to GDPR

    •. Learn how the world is embracing GDPR since it's May 25th launch

    •. Hear from industry experts on what to expect in the coming month

    •. Ask questions and learn from your peers on best preparation and adaption practices

    Register Today
  • Symantec Web and Cloud Security - Secure Web Gateway (SWG) Recorded: Aug 29 2018 36 mins
    Dr. Michael Teschner, Michael Straschydlo
    Symantec definiert die Web- und Cloud-Security neu. Wir haben Advanced Threat Protection, CASB SaaS-Kontrollen, Webrisiko und Datensicherheit in unsere Web-Gateway-Lösungen (ehemals BLUE COAT) integriert, um Ihnen eine einfache Möglichkeit für die sichere Nutzung von Cloud-Anwendungen und -Architekturen zu bieten.
    Damit erhalten Sie eine echte hybride Architektur aus universellen Richtlinien, mit denen Sie die Cloud-Nutzung aller Benutzer über einen cloudbasierten Web Security Service steuern können, hochgradig skalierbaren virtuellen Appliances für Private und Public Clouds sowie einer umfassenden Auswahl an On-Premises-Appliances
  • Why Data-Centric Authentication is at the Heart of Zero Trust Recorded: Aug 28 2018 60 mins
    Andras Cser Vice President, Principal Analyst, Forrester and Salah Nassar, Director of Information Protection from Symantec
    It’s called a 'data breach' for a reason. Bad actors are after your sensitive data. Users, endpoints, email, and cloud applications are communication channels that serve as attack vectors. In a "Zero Trust" model where you cannot trust anything in or out of your network: focusing the perimeter around the data and protecting it with intelligent authentication is the best security approach. Most authentication solutions on the market authenticate access to almost everything BUT your data. Organizations invest heavily in DLP policies to have visibility and protection around their sensitive data. In fact, organizations spend the majority of security resources around threat and data protection solutions to protect data. Blindly allowing users to access the data without checking their identity negates the entire security stack.

    To implement Zero Trust successfully in your organization, the best products are the ones that give you the most visibility into who is accessing your data both on-premises and in the cloud. Before a user is granted access, all risk factors surrounding the user and their authenticating device need to be evaluated. Other risk factors that compromise the level of assurance could be malware, bad IP addresses, malicious files, and networks, or stolen credentials on the darknet. Simply put: protect your data and trust no one.

    In this webinar, you will hear from guest speaker Andras Cser, VP and Principal Analyst on IAM and Fraud Management at Forrester and Salah Nassar, Director of Information Protection from Symantec break down the following:

    •What are the components of Zero Trust?
    •How to implement Zero Trust successfully in your organization.
    •What are the important security solutions core to Zero Trust and why data protection and identity are central to this model.
    •What to look for in Zero Trust data-centric authentication vendor.
  • Optimize Cloud-based Analytics to improve SOC team Productivity Recorded: Aug 14 2018 50 mins
    Torry Campbell; Sr. Director, Enterprise Solutions and Javier Santoyo; Sr. Director, Global Security Intelligence
    Security Operations Center (SOC) managers struggle to build teams with the right balance of skills and experience. A cyber security skills shortage and budget constraints are pushing managers to enhance the skills of tier 1 analysts and increase the productivity of tier 2 analysts.

    In addition, tier 3 analysts are expensive and hard to retain, so organizations are looking for better ways incorporate the expertise of skilled threat hunters.

    This webcast covers innovations in threat analytics and automation that enhances the efforts of analysts at each level.

    Join us to learn how security teams

    -Employ local and global telemetry to continuously improve attack and anomaly detection

    -Find attack patterns with cloud-based analytics before attackers exfiltrate data

    -Quickly convict unknown files with advanced content inspection and sandboxing

    -Replicate the skills and best practices of expert analysts via automated artifact collection and threat hunting playbooks

    In addition, we’ll demonstrate how Symantec Endpoint Detection and Response (EDR) allows
    resource-constrained SOC teams to detect and respond advanced attacks more effectively.

    Register Today
  • Minimieren Sie den Impact einer Cyber-Attacke durch 24x7 Monitoring Recorded: Jul 31 2018 40 mins
    Nicole Groke (Enterprise Account Manager) & Lars Kroll (Cyber Security Strategist)
    Symantec Managed Security Services – Minimieren Sie den Impact einer Cyber-Attacke durch 24x7 Monitoring unserer Experten, die kontinuierlich die Bedrohungslage analysieren.

    Lernen Sie Symantec Managed SIEM (Managed SOC) + Incident Response Services kennen und diskutieren Sie mit unseren Experten über Ihre jahrelangen und ggf. kostenintensiven SIEM-Ansätze.
  • Want to tackle GDPR with confidence? Recorded: Jul 30 2018 1 min
    Symantec
    GDPR is here, How Ready Are You?

    The EU General Data Protection Regulation (GDPR) deadline has passed. It supersedes all previous national data protection laws in the EU and can impact your organization in terms of handling and protecting personal data.

    IDC's GDPR Readiness Assessment only takes a few minutes and will provide you with some essential guidance on your GDPR compliance and what you need to consider to be compliant.

    Take the IDC self-assessment now and get a custom report to help you improve your current security posture and recommended actions.
  • Are you GDPR Complaint? Recorded: Jul 30 2018 1 min
    Symantec
    GDPR is here, How Ready Are You?

    The EU General Data Protection Regulation (GDPR) deadline has passed. It supersedes all previous national data protection laws in the EU and can impact your organization in terms of handling and protecting personal data.

    IDC's GDPR Readiness Assessment only takes a few minutes and will provide you with some essential guidance on your GDPR compliance and what you need to consider to be compliant.

    Let IDC experts help you. Take our self-assessment to discover and data protection exposures and recommended next steps.
  • A CTO’s Perspective: Network Security for the Cloud Generation Recorded: Jul 25 2018 30 mins
    Dr. Hugh Thompson, CTO Symantec and Mark Urban, VP Product Strategy & Operations, Symantec
    Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. Traditional approaches to network protection are going away as the concept of a secure perimeter disappear.

    In this webcast we’ll look at today’s new business paradigm, the challenges we now face, along with best practices for building a secure network in the cloud.

    Join Hugh Thompson, CTO of Symantec, and Mark Urban, VP Product Strategy & Operations, Symantec as they share their vision for Cloud Generation Network Security and how they see leading companies of all sizes prepare for the future.

    In this session they’ll discuss:

    •. A security insider’s view of market trends and the 24/7/365 demands of a distributed workforce

    •. The increased complexity of managing full security stack with limited resources

    •. The technical challenges of securing cloud applications

    •. Cloud solutions that solve cloud problems

    It promises to be an insightful event for all security, network and IT professionals. After their presentation the speakers will also take questions from the audience.

    We highly encourage you to register and reserve your spot today.

    Register Now
  • Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe Recorded: Jul 13 2018 52 mins
    Armin Schneider ; Olaf Mischkovsky
    Symantec Control & Compliance Suite – Automatisieren Sie Compliance-Abläufe, schaffen Sie Transparenz und sparen Sie wertvolle Zeit

    Symantec Control Compliance Suite liefert geschäftsrelevante Sicherheits- und Risikoinformationen, mit denen Sie Prioritäten für die Bereiche Sicherheit, IT-Betrieb und Compliance effektiv abstimmen können. Bewertungen erfolgen fortlaufend und automatisiert. Sie erhalten damit eine Gesamtübersicht über Sicherheitskontrollen und Sicherheitslücken. Auf diese Weise sind Sie in der Lage, das Rechenzentrum zu härten, die Behebung von Sicherheitsvorfällen zu priorisieren, sicher auf ein Software-Defined Data Center umzustellen sowie kontinuierliche Bewertungen für die Cyber-Sicherheit und die fortlaufende Überwachung zu unterstützen
  • When the Walls Come Tumbling Down – Network Security for the Cloud Generation Recorded: Jun 27 2018 66 mins
    Mike Chen, Director of Product Marketing, Tim Murphy, Sr. Manager Network Product Marketing, Robert Arandjelovic EMEA
    Cyber security professionals are at a crossroads. The game has changed, and the bad guys are getting more aggressive and inflicting more and more damage on corporate assets—and reputations—worldwide.

    Ransomware is through the roof, zero-day exploits are exploding, threats are hiding in encrypted traffic and email is riddled with malware. There is no perimeter anymore. Data, devices and employees are mobilized and traffic is increasingly going to the internet and cloud applications. So, the question now is, how do you protect a castle—by which we mean your enterprise—when the walls are tumbling down?

    In this webinar we'll discuss:
    - Why you should embrace cloud-based network security
    - The tools you need to provide protection against a variety of attacks
    - Why a proxy belongs at the center of your cloud service
    - Cloud migration strategies
    - Integrations that orchestrate defenses across control points and attack vectors

    Register Today
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Anatomia di un attacco di ransomware
  • Live at: Sep 28 2016 8:00 am
  • Presented by: Antonio Forzieri, Global Cyber Lead & Gabriele Zanoni, Incident Response Investigator
  • From:
Your email has been sent.
or close