Hi [[ session.user.profile.firstName ]]

Defense Against a Ransomware Attack: Latest Research and Best Practices

On May 12 2017, a new variant of the WannaCry ransomware (Ransom.Wannacry) suddenly appeared, infecting thousands of computers worldwide within a matter of hours.

It was a new and particularly dangerous form of threat because of its ability to self-propagate and spread itself across an organization’s network and on to other organizations via the Internet.

The ransomware landscape has shifted dramatically in 2017 and organizations bore the brunt of the damage caused by new, self-propagating threats such as WannaCry and Petya. These outbreaks caused global panic and caught many organizations off-guard, with infections spreading rapidly across corporate networks.

The impact of these incidents will not go unnoticed on the cyber crime underground and it’s likely that other groups may attempt similar tactics. Because of the nature of these attacks, organizations are particularly at risk. Businesses need to educate themselves about this new avenue of attack and ensure they have defenses in place.

Symantec experts recommend adopting a multilayered approach to minimize chances of infection. This strategy includes protecting against ransomware in three stages:

1. Prevent – Preventing infection is by far the best outcome so it pays to pay attention to how infection can be prevented.

2. Contain – In the event of a payload arriving on a computer, a critical step is to limit the spread of the attack.

3. Respond – Contact Incident Response experts, back up important data, and never pay the ransom.

Join us for a discussion about the current state of ransomware and learn the strategies and the technologies for effective protection against ransomware and unknown threats.

Register Today
Recorded Dec 12 2017 61 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec
Presentation preview: Defense Against a Ransomware Attack: Latest Research and Best Practices
  • Channel
  • Channel profile
  • Get all your questions on GDPR answered Apr 24 2018 11:00 am UTC 60 mins
    Sunil Choudrie, Giampiero Nanni, Robert Arandjelovi, Alexander Peters, Ramses Gallego
    Do you have a burning question you’d like to ask about the GDPR? Now you have a chance to get an answer – straight from the experts. We’ll be hosting a live Q&A with a panel of GDPR experts. And with the clock ticking down to the May 25th deadline, this is a perfect opportunity to get the answers you need.

    The discussion will enable you to successfully prepare for the GDPR by:

    • Understanding its full implications for your organisation
    • Identifying and tracking personal data, wherever it may be
    • Implementing cyber security to protect your data systems
    • Detecting and responding effectively to security breaches
    • Building a GDPR compliance program for the long term

    Get all your questions answered and ensure you’re ready for May 25th by joining our Q&A.
  • Desde la minería de monedas virtuales hasta los ataques a la cadena desuministro Recorded: Apr 18 2018 64 mins
    Ramses Gallego
    Le explicamos las últimas tendencias de las amenazas.

    Desde la repentina expansión de WannaCry y Petya/NotPetya, hasta el rápido crecimiento de los mineros de monedas virtuales, el 2017 nos ha recordado una vez más que las amenazas a la seguridad digital pueden venir de fuentes totalmente nu evas e inesperadas. No solo ha aumentado el propio volumen de las amenazas, sino que su entorno se ha hecho más diverso ya que los atacantes trabajan cada
    vez más duro para descubrir nuevas vías de ataque y, a su vez, ocultar sus pistas mientras lo hacen.

    Únase a la experta líder sobre amenazas de Symantec, quien nos compartirá los hallazgos del Informe sobre las ame nazas para la seguridad en Internet (ISTR por sus siglas en inglés) de 2018, en donde se incluyen datos clave sobre:

    - La fiebre del oro de la minería de monedas virtuales.
    - Los cambios en las tendencias del ransomware.
    - Ataques dirigidos ilustrados en números.
    - Infecciones de la cadena de suministro del software.
    - La explosión de las amenazas móviles.

    Inscríbase hoy
  • Dal coin mining agli attacchi alle supply chain Recorded: Apr 18 2018 49 mins
    Giampiero Nanni and Antonio Forzieri
    Analisi delle ultime tendenze delle minacce

    Dal boom inaspettato di Wanna e Petya/NotPetya al veloce dilagare dei coin miner, il 2017 ci ha dimostrato ancora una volta che le minacce per la sicurezza digitale possono provenire da fonti inattese.
    Oltre all’impennata nel volume, le minacce si sono ulteriormente diversificate, con i criminali che si industriano pur di scoprire nuove strategie di attacco e, allo stesso tempo, coprire le proprie tracce.

    Segui l’esperta in minacce di Symantec che illustra i risultati dell’Internet Security Threat Report (ISTR) 2018, analizzando anche:

    La corsa all’oro digitale

    - Le attuali tendenze dei ransomware
    - Gli attacchi mirati, in cifre
    - Le infezioni della supply chain dei software
    - Il picco delle minacce per i dispositivi port atili

    Registrati subito
  • Cyber menaces : du minage de cryptomonnaies aux attaques de la chaîne logicielle Recorded: Apr 13 2018 61 mins
    Laurent Heslault, Directeur des Stratégies Sécurité, Symantec France
    De la propagation des ransomwares WannaCry et Petya/NotPetya à l’essor fulgurant du minage de cryptomonnaies, l’année 2017 nous a rappelé que les menaces de sécurité peuvent provenir de sources aussi changeantes qu’inattendues. Outre la très forte augmentation du volume des attaques, le paysage des menaces s’est diversifié, les attaquants s’efforçant de découvrir de nouveaux vecteurs d’attaques tout en brouillant les pistes.

    Retrouvez nos experts Symantec pour en savoir plus sur les conclusions de l’Internet Security Threat Report (ISTR) 2018, notamment :
    - La ruée vers l’or numérique, avec le minage des cryptomonnaies
    - La réorientation des tendances liées au ransomware
    - Les derniers chiffres des attaques ciblées
    - Les infections visant la chaîne logistique logicielle
    - La flambée des menaces mobiles

    Inscrivez-vous dès aujourd’hui
  • From Coin Mining to Supply Chain Attacks. The Latest Threat Trends Explained. Recorded: Apr 12 2018 35 mins
    Orla Cox, Director Development Symantec
    From the sudden spread of WannaCry and Petya/NotPetya, to the swift growth in coin miners, 2017 provided us with another reminder that digital security threats can come from new and unexpected sources.Not only has the sheer volume of threats increased, but the threat landscape has become more diverse, with attackers working harder to discover new avenues of attack and cover their tracks while doing so.

    Join Symantec's leading threat expert, Orla Cox as she shares findings from the 2018 Internet Security Threat Report (ISTR) including insights on:

    - The Coin Mining Gold Rush
    - Shifting Trends in Ransomware
    - Targeted Attacks by the Numbers
    - Infecting the Software Supply Chain
    - The Surge in Mobile Threats

    Register Today
  • „Erkenntnisse aus dem neuesten Internet Security Threat Report (ISTR) 2018“ Recorded: Apr 12 2018 61 mins
    Candid Wuest and Alexander Peters
    Verpassen Sie die Möglichkeit nicht, sich mit den führenden Analysten von Symantec über die Erkenntnisse aus dem neuesten Internet Security Threat Report (ISTR) aus dem Jahr 2018 auszutauschen.
    Erhalten Sie tiefe Einblicke in die Themen:

    - Der Goldrausch der Cryptominen
    - Der sich wandelnde Trend der Ransomware-Infektionen
    - Details über gezielte Cyber-Angriffe
    - Infektionsgefahren durch Softwareupdates
    - Die Welle der mobilen und IoT Bedrohungen setzt sich fort
  • GDPR : plus que 2 mois Recorded: Mar 16 2018 47 mins
    Il ne vous reste que quelques mois avant l’entrée en vigueur du GDPR. Que pouvez-vous faire dès aujourd’hui pour mieux vous y préparer ? Animé par Patrice Payen, Team leader Risk, Compliance & GDPR, et Hervé Doreau, Directeur Technique, ce webcast a pour but de vous aider à évaluer votre degré de préparation et vous indiquer les mesures à prendre avant la date butoir du mois de mai.

    Avant d’assister à ce webcast, faites le point avec l’évaluation d’IDC. Elle vous montrera où vous en êtes dans votre préparation au GDPR. http://symantecgdpr.idcready.net/fr/?utm=sLVdLk56zk
  • Il tempo scorre: agisci ora per accelerare il tuo viaggio verso il GDPR Recorded: Feb 23 2018 64 mins
    Giampiero Nanni
    Mancano pochi mesi alla scadenza del GDPR, e non c’è tempo da perdere. Che cosa puoi fare, praticamente, in questo momento per prepararti al meglio? Organizzato dagli esperti in sicurezza Symantec, il webinar “90 giorni al GDPR” è ricco di suggerimenti e consigli essenziali.

    A prescindere dal tuo livello di preparazione, questo webinar ti aiuterà a capire la tua posizione, offrendoti consigli pratici e concreti da attuare prima della scadenza di maggio.

    Non affidarti al caso: registrati ora.

    Se non lo hai già fatto, prima di seguire il webinar completa il modulo di valutazione d el tuo stato di preparazione al GDPR (GDPR Readiness Assessment) di IDC: ti permetterà di capire a che punto sei nella tua pianificazione per realizzare la compliance al GDPR.

    Completa la valutazione >>
  • Die Uhr tickt: stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung Recorded: Feb 23 2018 61 mins
    Symantec, Alexander Peters
    Handeln Sie jetzt – und stellen Sie die Weichen für eine erfolgreiche DSGVO - Umsetzung

    Verlieren Sie keine Zeit – die DSGVO kommt schon in einigen Monaten. Aber wie können Sie sich aktiv darauf vorbereiten? Im Webinar
    ‘Noch 90 Tage bis zur DSGVO’ geben Ihnen die Symantec Experten v iele praxisnahe Tipps für die Umsetzung.

    Ganz egal, wie weit Sie mit Ihrer Vorbereitung heute sind: Im Webinar erfahren Sie, wo Sie aktuell stehen, und erhalten rechtzeitig vor dem Stichtag im Mai klare, handlungsrelevante Tipps.

    Gehen Sie kein Risiko ein – melden Sie sich noch heute an.

    Vor der Teilnahme am Webinar sollten Sie, wenn es noch nicht gesche hen ist, auch das GDPR Readiness Assessment von IDC
    absolvieren. Es hilft Ihnen einzuschätzen, wie weit Ihre Vorbereitung vorangeschritten ist.

    Zum Assessment •http://symantecgdpr.idcready.net/de/?utm=aI638CIsFU

  • El tiempo corre: haga algo ahora mismo para hacer frente al RGPD Recorded: Feb 23 2018 55 mins
    Ramses Gallego, Strategist Symantec
    Faltan pocos meses para que el nuevo RGPD entre en vigor, por lo que no hay tiempo que perder. ¿Sabe qué puede hacer desde ahora mismo para prepararse debidamente? Organizado p or los expertos de Symantec, el seminario web «90 días para el RGPD» incluye numerosos consejos y técnicas al respecto.

    Independientemente de la etapa de preparación en la que se encuentre su organización, este seminario web le ayudará a entender el nivel de preparación de su organización y, además, le ofrece pasos prácticos y ejecutables para cumplir con la fecha límite de mayo.

    No se la juegue e inscríbase ahora mismo.

    Pero antes de asistir al seminario web, si no lo ha hecho aún, sería muy útil que realizara la evaluación de preparación para el RDPG preparada por IDC. Esta le ayudará a determinar en qué etapa se encuentra su plan de preparaci ón para el RGPD.
    Realice la evaluación INSCRÍBASE YA
  • The clock is ticking: GDPR: Act now to accelerate your GDPR journey Recorded: Feb 22 2018 49 mins
    Robert Arandjelovic and Sunil Choudrie, Symantec
    With GDPR just months away, there’s no time to lose. But what can you actively do right now to help you prepare? Hosted by Symantec security experts, this ‘90 Days to GDPR’ webinar is packed with essential tips and advice.

    Wherever you are in your preparations, this webinar helps you understand your level of readiness and gives you practical, actionable steps ahead of the May deadline.

    Don’t leave it to chance – register now.

    Before you attend the webinar, if you haven’t already, take IDC’s GDPR Readiness Assessment. It will determine what stage your GDPR planning is at.

    Take Assessment >> https://symantecgdpr.idcready.net/?utm=jyWguSFtTX
  • Détection, investigation et remédiation d‘une attaque grâce aux technos Next-Gen Recorded: Feb 2 2018 38 mins
    Hervé Doreau, Directeur Technique, et Flavien Moutardier, Ingénieur Avant-Vente
    Un collaborateur se connecte avec son smartphone au hotspot de l’aéroport, sans se douter que son voisin va prendre la main pour pénétrer dans le réseau de votre entreprise… Avec 55% des ransomwares ciblant les entreprises et 2 millions de variantes de malwares par jour en 2017, continuer avec une approche traditionnelle de sécurité peut vous conduire à une situation critique similaire à gérer. Au travers de scenarios d’attaques de type ransomware ou PowerShell, nos experts vous montreront comment les technologies next-gen de protection des terminaux (Machine Learning, EDR, Deception, Hardening …) interagissent pour vous aider dans les phases de détection, protection, investigation et remédiation face aux attaques avancées.
  • Protect Your Business Against Today’s Advanced Mobile Security Threats Recorded: Feb 1 2018 60 mins
    Brian Duckering, Sr. Mobile Security Specialist, Symantec
    Mobile devices have become ubiquitous in business, permeating every aspect of user productivity and customer experience, yet many of these are also personal devices left unprotected against advanced malware and OS vulnerabilities.

    Considering the vast amounts of sensitive data that are stored on and communicated through these devices, how do we maintain the essential controls, security and privacy that are essential in the cloud generation?

    In this webcast, you will:

    - Learn about the various and advanced methods hackers use to attack and compromise mobile devices.

    - Understand the importance of being able to Predict, Detect, and Protect against all types of mobile threats.

    - Learn specific strategies and technologies that will support the need for visibility and full protection of your mobile infrastructure.

    Register Today
  • Wie weit sind Sie bei der Umsetzung der DSGVO-Anforderungen? Recorded: Feb 1 2018 62 mins
    Paul Voigt, Lic. en Derecho, CIPP/E (Rechtsanwalt & Abogado) / Alexander Peters (Symantec)
    Sicherheit & Datenschutz ist Chefsache!
    Gast: Paul Voigt, Rechtsanwalt & Abogado,
    Lic. en Derecho, CIPP/E

    Trotz der Informationsflut zum Thema EU Datenschutz-Grundverordnung und dem neuen Bundesdatenschutzgesetz -die am 25. Mai 2018 in Kraft treten- befinden sich viele Unternehmen weit hinter dem Zeitplan und meinen, dass sich nicht viel ändern wird. Das ist leider eine falsche Wahrnehmung.

    Wir diskutieren in dem Webcast, wie Sie in 10 Schritten sicherstellen, dass Sie die den neuen Anforderungen gerecht werden und welche Symantec Technologien Ihnen hierbei helfen können.

    Weitere Informationen zum Thema DSGVO: HIER öffnen

    Inhalte :
    1.Übersicht Rechtslage; Kernthemen der EU DSGVO; Mythen & wichtige Termine
    2.wichtigste Schritte zur Anpassung an die neuen Anforderungen
    3.Übersicht über die Möglichkeiten von Symantec, Sie zu unterstützen:
    •DSGVO-spezifisches Risiko-Assessment mittels Control Compliance Suite (CCS)
    •Erkennen, welche Daten sie wirklich besitzen, wo sie gespeichert sind, wer darauf zugreift und wie sie genutzt werden können
    •akkurat einschätzen, wo Datendiebstahl und Datenmissbrauch drohen
    •mittels Data Loss Prevention, komplexe, sensible Daten in strukturierten und unstrukturierten Umgebungen schützen
    •lückenlose Transparenz über Ihre Schatten-IT
    Bewertung Ihrer Schutz-Technologien: Sind diese auf dem Stand der Technik?

    Paul Voigt, Lic. en Derecho, CIPP/E
    Rechtsanwalt & Abogado
    Fachanwalt für Informationstechnologierecht

    Paul Voigt ist Rechtsanwalt in der internationalen Sozietät Taylor Wessing. Er verfügt über ausgewiesene Expertise im IT-Vertragsrecht, im Datenschutzrecht sowie im IT-Sicherheitsrecht. Paul Voigt berät praxisnah und businessorientiert sowohl Start-Up-Unternehmen als auch Mittelständler und globale Konzerne. Seine Mandate haben meist einen internationalen Bezug.
  • Best Practices for Data Privacy Day 2018 Recorded: Jan 30 2018 61 mins
    Zoltán Précsényi, Director GDPR Strategy, EMEA Legal, Symantec
    Creating a culture of privacy at work starts with teaching your organization what privacy means. Customers and stakeholders want to understand what personal data is being collected about them, how it will be used and whom it will be shared.

    Symantec is proud to support Data Privacy Day, please join Symantec’s Zoltán Précsényi for a webcast on 1/30 to learn how to:

    •Articulate what privacy means to your organization and share best practices to achieve and maintain security internally and with third parties.

    •Define security measures to protect individuals’ personal information from unauthorized access and use.

    •Explore the fundamentals of what personal data means under GDPR

    •Communicate your data use practices to your customers’ and explain how you manage their personal information.

    Register Today
  • Erfolgreich – und sicher – auf Office 365 migrieren Recorded: Jan 30 2018 59 mins
    Alexander Peters
    Eine Migration auf Office 365 in der Cloud macht durchaus Sinn.
    Die Verantwortung für die Sicherheit lässt sich jedoch nicht auslagern.
    Leider sind vorhandene „Bordmitteln“ nicht ausreichend, um Sicherheitsmaßnahmen umsetzen zu können.

    Im Webcast werden wir Ihnen aufzeigen, wie Sie die Kontrolle über ihre Daten bewahren und -mittels einer Security-Checkliste für die Office 365 Migration- schrittweise vorgehen können.

    Weitere Informationen zum Thema Office 365: HIER öffnen

    Im Webcast gehen wir speziell auf folgende Office 365 Themen ein:

    -Einsatz des Symantec Cloud-SOC (CASB) zum Schutz von Cloud-Daten und -Anwendungen
    -automatisierter Schutz von Daten durch Data Loss Prevention und Information Centric Encryption
    -erweiterte Sicherheit beim Zugriff auf Office 365
    -verbesserter Schutz vor Advanced Threats und CEO Fraud via E-Mail
    -Optimierung der Nutzung von Office 365 via Proxy Dienste

    LIVE WEBCAST: 30.01.2018, 10:00 Uhr
    -im Anschluß: „on Demand“ verfügbar
  • Secrets Revealed: Effective Protection Against Ransomware Recorded: Jan 18 2018 62 mins
    Naveen Palavalli, Director, Product & GTM Strategy, Symantec and Jonathan Korba, System Engineer, Symantec
    Since WannaCry and Petya took the world by storm in May of 2017, defending laptops, desktops, and IT assets from ransomware has become critically important for enterprises.

    This webinar looks look at the newly released advanced capabilities of Symantec Endpoint Protection 14.1 that help protect against ransomware attacks and the strategies and the technologies that Symantec customers have deployed technology for effective protection against ransomware and unknown threats.

    Join us to discover how you can:

    · Block ransomware via latest enhancements into behavior monitoring, machine learning and intrusion prevention

    · Gain enhanced visibility into suspicious activity across your endpoint estate

    · Optimizing endpoint security across different environment needs such as high risk employee groups, low bandwidth environments, etc

    In addition we’ll also show you SEP 14.1 in action, with a demo that showcases how unknown threats don’t stand a chance.

    Register Today
  • Get Lean, Get Mean – Thwarting Hackers with Single Agent Endpoint Security Recorded: Jan 18 2018 63 mins
    Naveen Palavalli, Director Product & GTM Strategy Symantec and Chris Sherman, Senior Analyst Forrester
    Three major trends define the Cloud Generation chaos that organizations face today. They are 1) Use of cloud applications, 2) An increasingly mobile workforce accessing these cloud applications from outside the perimeter and 3) Use of both corporate owned and BYO devices (PC, Mac and Mobile).

    On the other hand, the threat landscape is constantly evolving with adversaries taking advantage of these trends to attack organizations with ransomware, targeted attacks and mobile malware.

    Existing solutions from the industry have been largely a mixture of disjointed point products to solve these problems piece meal. All of these have led to operational complexity for Organizations who face a severe shortage of skilled IT security personnel.
    Attend this webinar and learn how endpoint security can solve these problems while increasing operational efficiency and lowering total cost of operations with a single agent architecture.
    In addition, Symantec will discuss how the latest evolution of Symantec Endpoint Security can:
    -Turn the tables on attackers by exposing intent and delaying their tactics using deception techniques and proactive security
    -Expose, investigate and resolve incidents including file-less attacks with integrated Endpoint Detection and Response
    -Harden environments against cyber-attacks with complete visibility into application attack surface and isolating suspicious applications
    -Extend advanced security to mobile devices to protect them from network based attacks and OS/App vulnerabilities.

    Register now
  • Delivering Complete Endpoint Security with Symantec Recorded: Jan 11 2018 62 mins
    Robert Arandjelovic, Product Marketing Director ; Gavin Fulton, Endpoint Security Expert
    Today’s threat landscape continues to evolve, with attackers using increasingly stealthy techniques that are difficult for traditional security controls to detect. New point solutions are emerging to stop one specific means of attack, but it’s impossible to deploy them all without incurring significant cost and complexity. Join us as we demonstrate how Symantec’s Complete Endpoint Security can enable you to deliver comprehensive endpoint security to your customers – featuring an array of state-of-the-art capabilities like the newly-introduced Deception as well as advanced detection and response – all within a single agent.
  • Frost & Sullivan Names Skycure (Now SEP Mobile) Company of the Year Recorded: Dec 21 2017 3 mins
    Jared Carleton, Principal Consultant Digital Transformation Practice, Frost & Sullivan
    Learn why Skycure (now part of Symantec) has been selected by Frost & Sullivan as their Global Company of the Year for Mobile Enterprise Security.
Webcasts targeted to security professionals
Symantec protects information wherever it’s stored or accessed. from your company’s most important information to your family photos.Everything we do begins with what we’ve learned about keeping people’s information secure.

We operate a worldwide cyberintelligence threat network that positions us to proactively address where you’re most vulnerable. This network captures worldwide security intelligence data that gives Symantec analysts unparalleled sources of data to identify and analyse, to deliver protection and provide informed commentary on emerging trends in attacks, malicious code activity, phishing and spam.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Defense Against a Ransomware Attack: Latest Research and Best Practices
  • Live at: Dec 12 2017 6:00 pm
  • Presented by: Kevin Haley, Director of Security Response, Symantec and Matt Sherman, Malware Outbreak Specialist, Symantec
  • From:
Your email has been sent.
or close