Hi [[ session.user.profile.firstName ]]

IT Security: from Complacent to Critical (EMEA)

** This is an EMEA focused webinar **

IT security for small to medium-sized businesses (SMBs) has turned from a situation where clients were complacent about IT Security to it now being a critical, high-demanded service offering.

This presentation looks at what has driven this shift in client attitudes, and how IT security needs to rapidly evolve to give MSPs access to the expertise and security technology they need to thrive.

Many MSPs are struggling with this new reality. This presentation will help you evaluate the IT security options open to you.
Recorded Sep 10 2019 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
George Anderson, Director of Product Marketing, Webroot
Presentation preview: IT Security: from Complacent to Critical (EMEA)

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security Awareness While Working Remotely Jul 21 2020 6:00 pm UTC 60 mins
    Ken Thon, Security Awareness Sales Engineer @ Carbonite + Webroot, an OpenText company
    Has being at home made us more lax about cybersecurity? At work, 49% of respondents said they had clicked links to messages from unknown senders. What does this mean for employees working remotely?
    Join Ken Thon to see how you can keep yourself security aware while working remotely.
  • HTTPS: Why Privacy Doesn’t Equal Security Jun 9 2020 6:00 pm UTC 60 mins
    David Dufour, VP Cybersecurity & Engineering
    In today’s hyperconnected world, one of the biggest dilemmas for internet users is privacy versus security. Many sites rely on HTTPS to secure your privacy, but HTTPS can also create security gaps that leave you vulnerable to cyberattacks. As a solution, internet browser vendors such as Google and Mozilla are now implementing DNS-over-HTTPS (DoH) to improve DNS security and encrypt your private data, but it’s far from perfect. In some cases, cybercriminals can use DoH to spread malware. As DoH becomes the new standard, it’s imperative to know what it is and how it works so you can protect yourself against new threats.

    Join OpenText’s David Dufour, VP Cybersecurity & Engineering to discuss the impact of DoH and what it means for your business and your customers.

    Key takeaways:
    •Learn why DoH is replacing HTTPs and what it means for internet security
    •Understand how cybercriminals can use DoH to put your business at risk
    •Find out how to secure your connection without sacrificing privacy
  • Security Awareness While Working Remotely Recorded: May 26 2020 27 mins
    Ken Thon
    Has being at home made us more lax about cybersecurity? At work 49% of respondents said they had clicked links to messages from unknown senders so, what does this mean for employees working remotely? Join Ken Thon to see how you can keep yourself security aware while working remotely.
  • Webroot Threat Report: 2020 and Covid-19 Recorded: May 20 2020 60 mins
    Tyler Moffitt, Senior Threat Research Analyst
    How is COVID-19 affecting cybersecurity? How are cybercriminals capitalizing on a thirst for information—and the desire to help others—to turn a quick buck? Join Tyler Moffit in our latest webinar as we analyze the new threat activity due to COVID-19 from malware, phishing and crypto jacking. Keep up to date with the newest threats and see how you can be cyber resilient
  • Webroot Threat Report 2020 and Covid-19 Recorded: May 19 2020 61 mins
    Tyler Moffit
    How is COVID-19 effecting cybersecurity? How are cybercriminals capitalising on a thirst for information—and the desire to help others—to turn a quick buck?

    You’re invited to join Webroot security analyst Tyler Moffitt for a webinar analyzing threat activity including malware, phishing, and cryptojacking that’s arisen in response to COVID-19.

    Ensure your clients are resilient against this new strand of attacks by joining our webinar.
  • Webroot Security Awareness Training Demo Recorded: May 14 2020 27 mins
    Webroot Endpoint Expert
    There’s a weak spot in your businesses/clients’ cybersecurity strategy that criminals are only too happy to exploit: end users. The success rates of targeted phishing and social engineering tactics mean end users are the easiest path for cybercriminals to infiltrate defenses.

    Join our live webinar to get answers and learn how to turn the weakest link into the best line of defense.

    Can't attend in person? No sweat! All registrants will receive an email with a recording of the demo afterwards.
  • Webroot® DNS Protection Demo Webinars Recorded: May 13 2020 27 mins
    Webroot Endpoint Expert
    Join one of our in-depth technical demonstrations of Webroot DNS Protection to learn how Webroot can keep your business/clients safe through all the stages of a cyberattack, across multiple attack vectors - in this case, the network.

    Can't attend in person? No sweat! All registrants will receive an email with a recording of the demo afterwards.
  • Webroot® Business Endpoint Protection Demo Recorded: May 12 2020 26 mins
    Webroot Endpoint Expert
    Cybercriminals attack from all angles, combining a range of threat technologies to attack businesses and their clients in stages, from multiple angles—or “vectors.”

    Sign Up for one of our in-depth product demonstrations of award winning Webroot® Business Endpoint Protection to learn how Webroot's multi-vector protection can keep businesses safe through all stages of a cyberattack.

    Can't attend in person? No sweat! All registrants will receive an email with a recording of the demo afterwards.
  • 2020 Threat Report: Trend and Predictions Recorded: Apr 22 2020 48 mins
    Tyler Moffitt, Senior Threat Research Analyst
    Over the last decade, technology has changed our world at an astonishing rate––forever altering our expectations. Immediate, personalized, and relevant experiences are a given today, but we also expect our personal data will remain secure and private.
    That’s why, each year we analyze threat activity to discover new trends across malware, phishing, cryptojacking, and more in our annual Webroot® Threat Report.

    Join Webroot experts to get the latest cybersecurity insights and statistics, and to learn how to be cyber-resilient in the face of new and existing threats.

    Key takeaways:
    •Dive into key trends and what that means for businesses
    •Learn the main types of threats and how to thwart them
    •Discover how to protect businesses from attacks with layered security
  • Webroot Endpoint Protection Product Demonstration Recorded: Apr 7 2020 28 mins
    Josko Gadzic
    To help keep clients safe from complex cyberattacks, it’s crucial for MSPs, resellers, distributors, and other partners to find cybersecurity vendors that serve your unique challenges while giving you complete visibility into web usage and full control to reinforce policies around it. That’s where Webroot comes in.

    Join our webinar to get answers and learn how to turn the weakest link into the best line of defense.
  • Webroot Security Awareness Training Product Demonstration Recorded: Mar 23 2020 37 mins
    Fran Bourke
    Cybercriminals target end users. Ongoing cybersecurity education and training for end users is a must for businesses to stay secure.To help keep clients safe from complex cyberattacks, it’s crucial for MSPs, resellers, distributors, and other partners to find cybersecurity vendors that serve your unique challenges. That’s where Webroot comes in.
  • Why Hackers Hack: The Hoodie Recorded: Mar 18 2020 63 mins
    Kelvin Murray, Senior Threat Researcher @ Webroot
    While it’s easy to imagine a black-hat hacker as a hoodie-clad loner coding away in a dark room, this is seldom the case. Many operate in groups or even as part of larger communities or networks, and they often use the same techniques, strategies, and tools to accomplish their ends. Hackers are coordinated and work within a broad and complex network. They often have salaries, set holidays, bonus payments and sales arrangements that include reseller portals and component rental. The only prerequisite for becoming a target is simply having a website, which puts all businesses with an online presence at risk. Fortunately, threat awareness and a proactive approach to security can go a long way in keeping your business secure.

    Join Kelvin Murray, Webroot Senior Threat Researcher, to learn why hackers hack and the methods they use so you can predict incoming threats, combat attacks, and securely lock down your business.

    Key takeaways:
    · Understand the major motivations behind why hackers hack
    · Learn the strategies, tricks, and tools that hackers use to breach a business and which matter most for different business types
    · Find out how to keep your business safe from becoming a target

    Register Now!
  • Why Hackers Hack: The Stereotype Recorded: Jan 22 2020 33 mins
    Grayson Milbourne, Director of Security Intelligence
    The truth is that hackers come in many forms and those with ill intentions can cripple or even destroy your business. Cyberattacks have grown increasingly complex, and hackers are evolving to match. Businesses must prepare to line up their defenses against today’s biggest threats, and that starts with debunking the most common myths about hackers.

    Join this webinar to learn what lies behind the stereotypical image of the hacker and why you should care.
  • 5 Ways to Protect Your Business from Phishing Recorded: Dec 17 2019 52 mins
    George Anderson, Product Marketing Director
    According to the latest Verizon Data Breach Investigations Report, human error was directly involved in 65%* of successful breaches in the last year, proving cybersecurity isn’t just a technology issue.
    People are the first line of defense against cyber threats, so educating them should be a major priority at your organization.

    Join our upcoming webinar to learn the risks associated with user error, 5 simple ways you can protect your business from phishing, and how security education can boost your bottom line.
  • 2019 Threat Landscape Roundup (EMEA) Recorded: Dec 16 2019 44 mins
    Tyler Moffitt, Sr. Threat Research Analyst, Webroot
    ** This is an EMEA focused webinar **

    SMBs are major targets for cybercriminals. To stay safe, today’s businesses must understand the types of cyberattacks they may encounter and how to implement strong cybersecurity practices.

    Register for this 30-minute webinar on the key threats businesses faced during 2019, see what's upcoming in 2020, and get tips to help you to keep your business and clients safe.

    A Webroot threat expert will be discussing information theft, information stealers, BEC scams, ransomware, targeted attacks, and all the cybercrime headlines of 2019.
  • Lockdown Lessons: Close Your Business Security Gaps Recorded: Dec 11 2019 41 mins
    Shane Cooper | Sales Engineer
    We can all agree: it’s the nature of technology to advance. Cybercrime is no exception to this rule, and neither are the tools we use to stop attacks. However, you’d be surprised how much a business can accomplish in terms of their own security simply by keeping existing systems up to date and using technology to their best advantage.

    Join this webinar to learn some basic ways that you can future-proof your very own IT environment against sophisticated, modern malware.
  • MSP’s Top Cloud Security Concerns and How to Tackle Them (EMEA) Recorded: Dec 9 2019 27 mins
    Fiona Challis, Channel Enablement & Sales Expert, Next Gen
    ** This is an EMEA focused webinar **

    The role of the cloud in IT security can be confusing and frightening for many customers and clients.

    Learn five tips for implementing cloud-based security for your clients. Discuss how to balance an approach with customers with those tips and understand the important questions to consider with customers considering cloud security as an option.
  • The Power IN Protection and Resiliency Recorded: Dec 4 2019 39 mins
    Jamie Zajac, Senior Director of Product, Carbonite
    Webroot and Carbonite empower businesses to be fearless in the face of cybercrime and data loss. Learn how affordable cybersecurity solutions help SMBs survive and thrive. From antivirus protection to backup and recovery services, this session addresses the daily cyber threats facing SMBs and the best practices and technologies for defending against them.

    From antivirus protection to backup and recovery services, this session addresses the daily cyber threats facing SMBs and the best practices and technologies for defending against them. Learn how affordable cybersecurity solutions help SMBs survive and thrive.
  • Why Artificial Intelligence and Machine Learning are Key for MSPs Recorded: Nov 19 2019 56 mins
    George Anderson, Director of Product Marketing, Webroot
    As the volume, sophistication, and complexity of cyberattacks on SMBs grows, current IT security solutions must become more pro-active, automated, and effective in response.

    This presentation looks at how SMBs and MSPs can tackle these issues now and in the future, and equips them with the IT security expertise and technology they need to defend their clients while benefitting from market growth.
  • 2019 Cybersecurity Trends (EMEA) Recorded: Nov 19 2019 64 mins
    Kelvin Murray, Sr. Threat Research Analyst, Webroot
    ** This is an EMEA focused webinar **

    As we near the end of 2019, we’ll take a look at some of the most pressing and prevalent threat trends from another busy year in cybercrime.

    This webinar promises to be a sneak peek at some of the developments sure to be covered in the 2020 Webroot Threat Report, so don’t miss it.

    We will update the key topics to be discussed closer to the date.
Intelligent Cybersecurity
Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individuals around the globe. Our smarter approach harnesses the power of cloud-based collective threat intelligence derived from millions of real-world devices to stop threats in real time and help secure the connected world. Our award-winning SecureAnywhere® endpoint solutions and BrightCloud® Threat Intelligence Services protect tens of millions of devices across businesses, home users, and the Internet of Things. Trusted and integrated by market-leading companies, including Cisco, F5 Networks, Aruba, Palo Alto Networks, A10 Networks, and more, Webroot is headquartered in Colorado and operates globally across North America, Europe, and Asia. Discover Smarter Cybersecurity™ solutions at www.webroot.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: IT Security: from Complacent to Critical (EMEA)
  • Live at: Sep 10 2019 3:00 pm
  • Presented by: George Anderson, Director of Product Marketing, Webroot
  • From:
Your email has been sent.
or close