Hi [[ session.user.profile.firstName ]]

#IMOS19 - The Death of Ransomware: Long Live Other Malware

Ransomware attacks are on the decline. Despite the devastation caused by recent ransomware outbreaks, a lack of public understanding about how to use cryptocurrency means that a lot of victims don’t know how to pay a ransom, whilst others are simply refusing to in greater numbers.

As a result, cyber-criminals are struggling to get a monetary return for their time and efforts spent on ransomware, and so are turning to other attacks methods, such as banking trojans, to make their money.

This session will explore:
•Why ransomware is dying out as an attack method
•How ransomware is now being replaced with alternative malware, both old and new
•How banking trojans are making a comeback as a result
Recorded Mar 27 2019 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Moderator: Danny Bradbury
Presentation preview: #IMOS19 - The Death of Ransomware: Long Live Other Malware
  • Channel
  • Channel profile
  • Zero Trust: A Cybersecurity Essential and the Key to Success Apr 16 2020 2:00 pm UTC 75 mins
    Michael Hill, Michael Zuckerman
    In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated.

    The truth is, today’s cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic – no matter where it originates.

    That’s where zero trust architectures come in. In this webinar, discover why zero trust approaches are becoming an urgent cybersecurity priority for enterprise and government organizations alike.

    Key takeaways:
    •The security trends fueling the adoption of zero trust architectures
    •The critical role that DNS security plays in successful zero trust implementation
    •The key elements you need to have in place and the next steps for moving forward
  • #IMOS20 - Election Hacking: Securing the Election to Protect Democracy Mar 26 2020 2:45 pm UTC 60 mins
    Moderator: Michael Hill, Spearkers:Joseph Carson, Dave Klein, Ryan Clark
    In this session, a panel of experts will assess the real security risks surrounding the upcoming elections, highlight their potential impact and discuss how to ensure the safety of future voting processes, and democracy in general, across the globe.
  • #IMOS20 - How To: Do Security Hygiene on a Shoestring Mar 25 2020 4:00 pm UTC 30 mins
    Moderator: Dan Raywood, Speaker: Gadi Evron, Lisa Ventura
    In this ‘How To’ session, a leading security expert will share practical insight and advice on how to best approach, implement and manage security hygiene in an organization without breaking the bank.
  • #IMOS20: Security at the Speed of Business: Keep Up or Get Left Behind Mar 25 2020 2:45 pm UTC 60 mins
    Moderator:Stephen Pritchard, Speakers: Cate Pye, Malcolm Barske.
    In this session learn:
    •Why security teams must operate at the high speed of business innovation
    •What challenges security functions must overcome in the face of business advancement
    •How to maintain efficient security processed in a data-driven age
  • #IMOS20 - Keynote Presentation Mar 25 2020 2:00 pm UTC 30 mins
    Presenter: Michael Hill
    Infosecurity presents on the latest issues and challenges affecting the information security industry.
  • #IMOS20- Combatting Burnout and Stress for Infosecurity Leaders: How to Keep Our Mar 25 2020 12:30 pm UTC 60 mins
    Moderator: Dan Raywood, Speakers: Neil Shah, David Slade, Amanda Finch, Lizzy Higgins.
    Join a panel of experts as they discuss the reasons for and the impact of stress and burnout within security leadership roles, along with highlighting how to keep those in the industry supported and healthy.
  • #IMOS20 - Point Counterpoint Live! Mar 25 2020 11:45 am UTC 30 mins
    Moderator: Michael Hill, Speaker: Ed Tucker
    Two security leaders battle it out on the topic of cyber-warfare, sharing high-level opinions, insight and key takeaways.
  • #IMOS20- Phish for Thought: Combatting Modern Email Threats Mar 25 2020 10:30 am UTC 60 mins
    Moderator - Dan Raywood, Speakers - Stephen Murdoch, Lisa Forte, Richard Henderson
    In this session, a panel of security experts will explore the phishing threat landscape in 2020, assess recent advancements in attack methods and outline what businesses need to do to defend themselves against the dangers of email-based phishing attacks.
  • #IMOS20 - The Resilience of Ransomware: A Relentless Foe Mar 25 2020 9:15 am UTC 60 mins
    Moderator: Michael Hill Speakers: Raef Meeuwisse, JamesChappell and Raj Samani
    This session will explore the current state of the ransomware risk landscape, assess why ransomware continues to be such a resilient attack threat and outline what makes for an effective, modern ransomware defense strategy.

    Key takeaways:
    •Why ransomware continues to be a damaging and effective attack vector
    •What does modern-day ransomware defense look like, and how to achieve it
    •What 2020 will have in store for ransomware
  • 2FA or MFA: Which Authentication is Right for Your Business? Mar 24 2020 3:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Barry McMahon, James Gosnold
    Authentication works to ensure that you’re you. As technology evolves and business needs change, authentication methods need to be more dynamic. Today’s workforce demands flexibly in areas such as device choice, work location, and levels of access so that they can deliver in their role. Yet security teams still need to keep the business safe and secure. This is why authentication must to adapt based to deliver for the employee and the security team.

    On this webinar, we will look at the differences between two-factor authentication (2FA) and multi-factor authentication (MFA), assessing the strengths and weaknesses of both and what factors you can expect to use in both options. We will also look at going “Passwordless” and what that really means to the employee and the business.

    Key takeaways:

    • Why traditional two-factor authentication is no longer enough to protect your business
    • What the differences are between 2FA and MFA
    • The evolution of multi-factor authentication to include biometric and contextual factor
    • The “Passwordless” future
  • Gain Control and Security of Your File Collaboration Mar 24 2020 2:00 am UTC 75 mins
    Danny Bradbury
    There are a lot of file sharing and collaboration tools available today – both free and paid – and finding the solution that meets your business requirements can be difficult.

    Sharing files and collaborating securely shouldn’t be tricky, but in practice, organizations can be met with diverse challenges as they seek to master the file collaboration process in a secure and effective way. However, if well-managed, file collaboration can bring significant business benefits and improve overall operability.

    In this webinar, learn how to bring your file collaboration to the next level through security, flexibility and centralization.

    Key takeaways:
    •The importance of file collaboration for your organization
    •How to master upload, download and collaborate files securely
    •How to gain more control in cloud-based collaboration
  • Strategies to Scale and Upskill Your Security Team Mar 5 2020 3:00 pm UTC 75 mins
    Moderator: Dan Raywood - Speakers: Mike Campfield, Rik Turner, Deidre Diamond
    Businesses these days face two main challenges: they have too much technology, and they don’t have the people to run and manage it. This has led organizations to come up with new ways to make their existing security resources more effective, and scale their existing human and technology resources in the face of increasing vulnerabilities.

    In this webinar, we will discuss the challenges and opportunities facing security and IT teams when it comes to scaling their cybersecurity talent, how they can train and “upskill” staff members to fit with the problems of the enterprise.

    Key takeaways:

    •Why the issue shelfware has become a problem for businesses
    •How to efficiently train and get staff the necessary skills
    •How machine learning can help alleviate alert fatigue
    •Strategies for increasing collaboration between Security and Network Operations teams
  • #RSAC Video Interview Syed Rahman Abdur, Director of Products, Brinqa Recorded: Feb 28 2020 13 mins
    Eleanor Dallaway and Syed Rahman Abdur
    Eleanor Dallaway sat down with Syed Rahman at RSA Conference 2020.
  • #RSAC Video Interview with Kathleen Smith, CMO, CyberSecJobs Recorded: Feb 28 2020 13 mins
    Dan Raywood and Kathleen Smith
    Dan Raywood sat down at RSA Conference 2020 with Kathleen Smith, CMO, CyberSecJobs to discuss the concept of community volunteering and how to give back to the information security industry.
  • #RSAC Video Interview Katie Moussouris,CEO, Luta Security Recorded: Feb 28 2020 15 mins
    Dan Raywood, Infosecurity Magazine & Katie Moussouris.
    Dan Raywood, Deputy Editor, Infosecurity Magazine sat down with Katie Moussouris, CEO, Luta Security at the RSA Conference 2020 to discuss bug bounty, patches, how companies are and/or should be managing security hygiene and more.
  • AI in Security: Keeping Up with the Trend Recorded: Feb 25 2020 60 mins
    Moderator: Michael Hill Speakers: Dr David Day, Stuart Jackson and Maninder Pal Singh
    AI has been predicted to be a future technology to keep a close eye on, bringing benefits for both a reduction in demands upon staff and better endpoint protection detection. However, is it something that your business can consider as we move into a new decade, and how can use you AI and predictive analytics to ensure your security posture is maximized without having to compromise user experience, mobility, and productivity better protect and fix your situational risk elements?

    On this webinar, we will look at fresh predictions around AI, look at how it can fit into your business, what options exist for adoption, and how you can leverage adopt it for better situational protection and enable more intelligent security.

    Key takeaways:

    What the benefits and negatives of AI can be
    How AI can identify behavioural and location patterns to determine certain risk factors enable location-based detection for increased security
    Using situational awareness for device security and access
    How AI enable better user experience
  • Automation in Data File Transfer: Improving Security and Saving You Time Recorded: Feb 20 2020 58 mins
    Michael Hill,
    Are you manually transferring numerous files in your workplace? If so, you may be opening your organization up to various security risks and threats, not to mention potentially wasting valuable time and resources.

    Although there are a plethora of file transfer tools available, many rely on outdated methods that no longer cut the mustard. The modern enterprise needs a centralized and securely automated approach to file transfer management.

    This webinar will highlight the security risks of manual file transfer processes, explore the various benefits that automation can bring and explain how your organization can effectively and securely reinvigorate your file transfer management.

    Key takeaways:
    •The security risks and challenges that surround file transfer management
    •Why automation is the key to fast, secure and effective file transfers
    •How to ensure your organization is ahead of the game with its file transfer methods
  • Leveraging ISO 27001 to Manage Cyber & Information Security Risks Recorded: Feb 13 2020 67 mins
    Moderator: Dan Raywood - Speakers: Rob Acker, Gopalakrishnan Kary, Chris Oakley
    A systematic approach to protecting key information assets is a powerful weapon in combating information risks by helping determine the types of security controls needed. This is where standards of cyber and information security come in, and ISO 27001 has been one of the most popular for many years.

    In this webinar, we will look at how the ISO 27001 standard has come to be recognized as the international benchmark for information and cybersecurity practitioners, how to achieve it, and most importantly, what it takes to remain compliant.

    Key takeaways:

    What you need to consider to achieve ISO 27001 certification
    How to maintain compliance with ISO 27001 and other standards such as ISO 27701 and ISO 27018
    Top considerations and key lessons learned from information assurance
  • Making SOAR Work For You Recorded: Feb 6 2020 61 mins
    Moderator: Dan Raywood - Speakers: Nick Tausek, Joe Hancock. Andrew Hay
    Security operations, automation and response (SOAR) has become an essential tool for security, as it reduces manual, repetitive tasks and enables analysts to have a better working process. This can be a force multiplier for your security operations center, making life better for them?

    In this webinar, we will look at SOAR and where it can be used to make life easier for the analyst, what strategies you can use to have consistent processes that works and how to do more with less.

    Key takeaways:
    •What SOAR can mean for your business in 2020
    •How to implement an automation strategy
    •What SOAR strategies you can use to improve incident response
  • New Year, New Decade, New Threats and Challenges Recorded: Jan 9 2020 60 mins
    Moderators: Dan Raywood, Michael Hill, Speakers: Paul McKay, Brian Honan
    As a new year and new decade are upon us, the same number of predictions are consistently made about what we can expect in the near and far future. Whether it is more malware, greater and stronger attacks or more problems, it seems that the future seems forever negative.

    In this webinar, we will look at the various trends that have been predicted for the cybersecurity industry by the vendor and research communities, and evaluate what has come true in the past, and what we can genuinely expect the future to look like.

    Key takeaways:

    What the predictions for 2020 tell us about the coming year
    What 2019’s predictions were, and what came true
    Which platforms were predicted to be hit harder than they were
    What leading researchers believe will be the key trends for 2020
Strategy - Insight - Technology
Dedicated to serving the information security community, in person, in print and online.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: #IMOS19 - The Death of Ransomware: Long Live Other Malware
  • Live at: Mar 27 2019 4:00 pm
  • Presented by: Moderator: Danny Bradbury
  • From:
Your email has been sent.
or close