Hi [[ session.user.profile.firstName ]]

10 Cybersecurity Predictions for 2018

It has been a turbulent year of devastating ransomware attacks (e.g. NotPetya) and gut-wrenching breaches (e.g. Equifax). Undoubtedly, the question on everyone’s mind is, “what’s in store for us in the New Year?” Webroot’s top 10 cybersecurity predictions for 2018 covers everything from ransomware and breaches to mobile, cryptocurrency, and government.

At Webroot, we believe it's possible to effectively protect businesses and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into emerging and existing threats--and how you can stay ahead.

We hope you can join us for this live, educational session!
Recorded Dec 21 2017 49 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Tyler Moffitt | Senior Threat Research Analyst
Presentation preview: 10 Cybersecurity Predictions for 2018

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • The Truth Behind Machine Learning Recorded: May 24 2018 31 mins
    George Anderson | Director of Product Marketing
    Over the past couple of years nearly every new security vendor, and many of the established vendors have started talking about Machine Learning as if it’s something new. Webroot won an innovation Edison Award in 2012 (over 6 years ago) for our use of Machine Learning in conjunction with our Webroot SecureAnywhere endpoint security. And, now we hear terms like Next Gen; AI; Machine Learning; Neural Nets and more banded around like they are something revolutionary, when frankly they are passé, out of context, buzzwords most of the time.

    This webinar will take you through how Webroot has been applying machine learning for well over 10 years now to create actionable threat intelligence to stop attacks across a wide range of threats and help you understand Machine Learning past the hype.
  • Fortifying Your First Line of Defense through Security Awareness Training Recorded: Apr 24 2018 43 mins
    Dan Fox | Product Manager
    According to the latest Verizon Data Breach Investigations Report, human error was directly involved in 65%* of successful breaches in the last year, proving cybersecurity isn’t just a technology issue. People are the first line of defense against cyber threats, so educating them should be a major priority at your organization.

    Join our upcoming webinar to learn about the risks associated with user error, and how security education can boost your bottom line.
  • Smarter by the Numbers. Smarter You. Webroot 2018 Threat Report Recorded: Apr 23 2018 54 mins
    Tyler Moffitt | Senior Threat Research Analyst
    Get the facts you need to stay safe against today's threats.

    When it comes to cybersecurity, change is the only constant. Analysts, researchers, and security companies worked quickly to identify and block emerging threats throughout 2017, but attackers were just as quick in finding new ways to evade defenses.

    The Webroot Threat Report shares a glimpse into our discoveries and analysis of threat activity during the year to equip you with the knowledge you need to overcome modern cybercrime.

    The report covers:
    - Trends in malware and potentially unwanted applications (PUAs)
    - IP addresses and their impact on security
    - Latest trends in ransomware and cryptojacking
    - How URL reputations and classifications help combat attacks
    - The evolution of phishing attacks
    - Mobile application threats
  • Webroot Smarter Cybersecurity | For The Connected World Recorded: Mar 22 2018 2 mins
    Webroot
    Watch this video to learn how Webroot provides smarter cybersecurity solutions to businesses all over the world.

    Try Webroot for yourself at webroot.com/businesstrials
  • Webroot DNS Protection | Stop Threats Before They Hit Your Network Recorded: Mar 19 2018 2 mins
    Webroot
    From websites that deliver malvertising to drive-by downloads that drop ransomware from a command and control server. Uncontrolled web usage is a huge risk for any business, no matter the size. But you can't just not use the internet. So how do you keep your business, end users and customers safe? -- With advanced web filtering at the DNS layer. Watch this video to see Webroot in action for yourself.

    Learn more at webroot.com/us/en/business/dns-protection
  • Securing Guest WiFi with SecureAnywhere® DNS Protection Recorded: Mar 14 2018 35 mins
    George Anderson | Director of Product Marketing
    Uncontrolled web usage is a risk for any organization, especially when average, non-business devices with questionable security can use your WiFi. You need to protect the people and devices that connect to your network—but you also need to protect your network from the risks those connections bring.

    Webroot SecureAnywhere® DNS Protection is an easy, straightforward way to secure guest/public WiFi connections, enforce acceptable web access policies on guest devices, gain visibility, and block up to 88% of malware before has the chance to damage your business and reputation.

    Join this webinar to learn all about Webroot SecureAnywhere® DNS Protection Guest WiFi.
  • Webroot Endpoint Protection | A Modern Approach To Modern Threats Recorded: Mar 13 2018 3 mins
    Webroot
    Traditional endpoint security is dead. Watch this video to see how Webroot's cloud based architecture takes the workload off endpoints and into data centers where behavior recognition immediately categorizes threats. See for yourself how the Webroot Intelligence Network protects you individually in stopping malware in real time. Threats are captured and analyzed in milliseconds. There is a reason we receive more 5-star reviews than any other Endpoint Security vendor!

    Learn more at webroot.com/endpoint
  • Keeping your Business off the Cybercrime Hit List in 2018 Recorded: Feb 21 2018 35 mins
    Kelvin Murray | Threat Research Analyst
    2017 saw a significant number of major events that showcased cybercriminal inventiveness. So-called “soft targets”, i.e., companies without adequate security measures or resources, were hit harder than ever before and will continue to be on cybercriminals’ hit lists. In this webinar, we’ll discuss the malware trends and tactics that prevailed in the last year, and how you can keep your business ahead in 2018.
  • The Top Cyber Threats Facing Businesses Recorded: Jan 17 2018 46 mins
    George Anderson | Director of Product Marketing
    Phishing and ransomware go hand-in-hand as the top online risks to today’s businesses, no matter their size. While many organizations have built out the technical aspects of their IT security strategy, that's not enough to stop these pervasive threats. A solid cybersecurity posture is built on a combination of people and processes, in addition to technology.

    In this webinar, we’ll look at how Webroot helps combine end user education, security best practices, and fully cloud-based Smarter Cybersecurity® solutions to stay ahead of modern threats.

    We hope you can join us for this live, educational session!
  • 10 Cybersecurity Predictions for 2018 Recorded: Dec 21 2017 49 mins
    Tyler Moffitt | Senior Threat Research Analyst
    It has been a turbulent year of devastating ransomware attacks (e.g. NotPetya) and gut-wrenching breaches (e.g. Equifax). Undoubtedly, the question on everyone’s mind is, “what’s in store for us in the New Year?” Webroot’s top 10 cybersecurity predictions for 2018 covers everything from ransomware and breaches to mobile, cryptocurrency, and government.

    At Webroot, we believe it's possible to effectively protect businesses and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into emerging and existing threats--and how you can stay ahead.

    We hope you can join us for this live, educational session!
  • Easiest and Most Effective Way to Secure Your Business Recorded: Nov 8 2017 37 mins
    Tim Sheahen | Senior Sales Manager
    The Webroot® Threat Intelligence Platform is a cloud-based architecture that classifies and scores 95% of the internet 3x per day.

    Comprised of millions of connected sensors and endpoints, in 2016 the Webroot Threat Intelligence Platform observed:

    •94% of malware and PUAs were seen only once
    •Approximately 1/3 of URLs were high risk
    •Zero-day phishing URLs doubled
    •And more…

    Discover the easiest and most effective way to secure your business with Webroot SecureAnywhere® Business Endpoint Protection.

    We hope you can join us for this live, educational session!
  • Ransomware Spotlight Recorded: Oct 19 2017 49 mins
    Tyler Moffitt | Senior Threat Reasearch Analyst
    Over the past few years, malware authors have developed increasingly sophisticated and creative ways to infect endpoints. Encrypting ransomware is no longer merely an annoyance. It's a highly persistent and organized criminal "business model" in full deployment, with new abilities to move laterally through networks and infect machines previously thought not possible to infect. The damage from becoming a ransomware victim is considerable, and can even put organizations out of business.

    At Webroot, we believe it's possible to effectively protect businesses and users, but only by understanding your adversary and the techniques they use for their attacks. In this webinar, Webroot's own Senior Threat Research Analyst, Tyler Moffitt, will offer expert insights into emerging encrypting ransomware variants--and how you can stay ahead.
  • WannaCry & NotPetya Deep Dive Recorded: Aug 15 2017 48 mins
    Tyler Moffitt | Senior Threat Research Analyst
    WannaCry and NotPetya have wreaked the most havoc seen by ransomware yet. Not only was it able to hit computers previously unsusceptible to ransomware by using NSA exploits, but it was also able to severely disrupt the infrastructure of nations like Ukraine and Health organization in the UK. Over 150 International Corporations ranging from car factories to container ships vessels had to halt in tracks to deal with this ransomware. In this Deep Dive presentation you will learn about these types of ransomware in depth and also learn how to keep your clients safe.


    Webinar highlights include:

    How Petya-based & WannaCry ransomware works and spreads
    The unpacked code analysis
    Other potential exploits and attack vectors to keep an eye on
    How you can protect your clients
    Q&A
  • Your Small Business Will Be Hacked - Because It Is Easy Recorded: Jul 25 2017 56 mins
    Sean Martin, ITSPmagazine | Rusty Sailors, LP3 | Russell Mosley, Dynaxys | Tom Caldwell, Webroot
    - Broadcast LIVE from Las Vegas during Black Hat 2017 -

    Small and medium businesses face countless threats, most of which have a human at their origin. These criminals, driven by financial gain, are essentially business owners – not unlike yourself – who are looking to spend as little money and as few resources as necessary to generate as much revenue as possible. Therefore, most cybercriminals target businesses that have a false sense of security.

    Why would a cybercriminal spend a fortune going after a Fortune 1,000 when they can spend a few bucks to crack a small business? Exactly!

    During this live webinar, we’ll explore the types of threats that small and medium businesses face and the business risk associated with these threats. It’s easier to get hacked than you think and it’s only a matter of time before it happens. Will your business be prepared? Are you doing everything you can to protect yourself beforehand?

    Knowing that perfection is not possible, our panel of experts will look at 4 key steps that small and medium businesses should take to reach a reasonable level of cybersecurity:

    - How to conduct an analysis to determine risk and the need to focus on cybersecurity within your business
    - How to assess the cost of a breach, a loss of information and the impact that a cybersecurity event can have on your customers and partners
    - How to create a plan to protect your systems, information, revenue and customers’ data
    - Best practices for guiding your implementation, from segmentation to employee access control policies to information protection controls

    Join us for an extremely informative session geared towards small and medium business owners and their IT staff.

    Moderator:
    Sean Martin, CISSP, Editor-in-Chief, ITSPmagazine

    Panelists:
    Rusty Sailors, President / CTO at LP3 and Chairman, Protecting Tomorrow
    Russell Mosley, Director, Infrastructure & Security, Dynaxys
    Tom Caldwell, Senior Director of Engineering at Webroot
  • Real-Time Multi-Vector Protection Recorded: Jul 5 2017 2 mins
    Ryan Free
    Multi-vector protection from Webroot is the only way to secure your endpoints and users across all stages of a cyberattack in real time. Using advanced behavioral heuristics to identify and protect against never-before-seen threats, see how Webroot is the Smarter Cybersecurity™ solution.
  • Stopping Malware Before It Reaches Your Network Recorded: May 30 2017 35 mins
    Jonathan Barnett | Sales Engineer
    Malware defenses have typically been concentrated at the network edge and then at the endpoint layer. When so much business is now in the cloud and user Internet requests are resolved outside the network it’s time to manage and control at the cloud ‘domain’ layer too. This webinar looks at a simple, fast, highly effective and easy way to block most malware before it reaches your network and deliver more secure Internet access at the same time.
  • FAKE NEWS – Signatureless! File less! Next Generation! X-Generation! Recorded: Apr 18 2017 29 mins
    Tim Sheahen | Senior Manager Sales
    Frankly I’m confused (and I work in endpoint security). In many ways you shouldn’t have to care about the terminology a vendor is using, but when it’s used to confuse and obscure reality, then you do.

    What really matters is how effective is your endpoint security at stopping users and devices from being compromised? How many ways will it prevent attacks and how do they all add up in delivering high performance, multi-vector protection?

    In this BrightTalk webinar we will be calling it as we see it, dispelling the ambiguous words and techno-babble being used and focusing on the core requirements you should ask all endpoint vendors for?

    Finally, this webinar is not going to be a pitch. At Webroot we have never claimed, and are not claiming that we’re a magic ‘silver bullet’, and with five years of cloud-driven endpoint security we’re not the ‘Emperor’s New Clothes’ either.

    What we want you to come away from this webinar with is the ammunition to ask hard questions about your endpoint security that will help you make better endpoint security decisions, when you or your colleagues have to make them.

    We want you to recognize the FAKE NEWS in endpoint security for what it really is – BS.
  • 2017 Webroot Threat Brief Recorded: Feb 23 2017 36 mins
    Tyler Moffitt | Senior Threat Research Analyst
    Get insights into the threat landscape.

    Presented by Tyler Moffitt, senior threat research analyst at Webroot, this webinar is based on data derived from the Webroot Threat Intelligence Platform, Webroot’s machine learning and contextual analysis engine.

    Comprised of millions of connected sensors and endpoints, in 2016 the Webroot Threat Intelligence Platform observed:

    •94% of malware and PUAs were seen only once
    •Approximately 1/3 of URLs were high risk
    •Zero-day phishing URLs doubled
    •And more…

    Get the insights you need to stay ahead of the malware curve in 2017.

    We hope you can join us for this live, educational session!
  • 8 Reasons Webroot is Smarter Recorded: Feb 7 2017 2 mins
    Recorded Video
    8 Reasons Webroot is Smarter
  • 2016 Malware Review and Top Threat Predictions for 2017 Recorded: Jan 24 2017 48 mins
    Tyler Moffitt | Senior Threat Research Analyst
    This presentation provides an overview of the threats against a wide range of organizations and individuals during 2016. This overview is based on research and analysis conducted by the Webroot Threat Research team. The report includes analysis of top ransomware variants, details on the changes to exploit kits, phishing detection statistics, insights into file reputation and encounter rates with malware and new information on the IoT environment. All data presented comes from Webroot’s Intelligence Network and was observed during 2016. We will also be looking forward into 2017 and making our predictions regarding the evolving threat landscape.
Intelligent Cybersecurity
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloud-based collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world. Our award-winning SecureAnywhere® endpoint solutions and BrightCloud® Threat Intelligence Services protect tens of millions of devices across businesses, home users, and the Internet of Things. Trusted and integrated by market-leading companies, including Cisco, F5 Networks, Aruba, Palo Alto Networks, A10 Networks, and more, Webroot is headquartered in Colorado and operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity™ solutions at www.webroot.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: 10 Cybersecurity Predictions for 2018
  • Live at: Dec 21 2017 6:00 pm
  • Presented by: Tyler Moffitt | Senior Threat Research Analyst
  • From:
Your email has been sent.
or close