#IMOS19 - The Death of Ransomware: Long Live Other Malware
Ransomware attacks are on the decline. Despite the devastation caused by recent ransomware outbreaks, a lack of public understanding about how to use cryptocurrency means that a lot of victims don’t know how to pay a ransom, whilst others are simply refusing to in greater numbers.
As a result, cyber-criminals are struggling to get a monetary return for their time and efforts spent on ransomware, and so are turning to other attacks methods, such as banking trojans, to make their money.
This session will explore:
•Why ransomware is dying out as an attack method
•How ransomware is now being replaced with alternative malware, both old and new
•How banking trojans are making a comeback as a result
RecordedMar 27 201960 mins
Your place is confirmed, we'll send you email reminders
In our increasingly cloud-first world, the idea of a trusted internal network zone and an untrusted external one is now outdated.
The truth is, today’s cyber-threats often get past perimeter defenses undetected, so you can no longer trust data traffic – no matter where it originates.
That’s where zero trust architectures come in. In this webinar, discover why zero trust approaches are becoming an urgent cybersecurity priority for enterprise and government organizations alike.
•The security trends fueling the adoption of zero trust architectures
•The critical role that DNS security plays in successful zero trust implementation
•The key elements you need to have in place and the next steps for moving forward
Moderator: Michael Hill, Spearkers:Joseph Carson, Dave Klein, Ryan Clark
In this session, a panel of experts will assess the real security risks surrounding the upcoming elections, highlight their potential impact and discuss how to ensure the safety of future voting processes, and democracy in general, across the globe.
In this session learn:
•Why security teams must operate at the high speed of business innovation
•What challenges security functions must overcome in the face of business advancement
•How to maintain efficient security processed in a data-driven age
Moderator: Dan Raywood, Speakers: Neil Shah, David Slade, Amanda Finch, Lizzy Higgins.
Join a panel of experts as they discuss the reasons for and the impact of stress and burnout within security leadership roles, along with highlighting how to keep those in the industry supported and healthy.
Moderator - Dan Raywood, Speakers - Stephen Murdoch, Lisa Forte, Richard Henderson
In this session, a panel of security experts will explore the phishing threat landscape in 2020, assess recent advancements in attack methods and outline what businesses need to do to defend themselves against the dangers of email-based phishing attacks.
Moderator: Michael Hill Speakers: Raef Meeuwisse, JamesChappell and Raj Samani
This session will explore the current state of the ransomware risk landscape, assess why ransomware continues to be such a resilient attack threat and outline what makes for an effective, modern ransomware defense strategy.
•Why ransomware continues to be a damaging and effective attack vector
•What does modern-day ransomware defense look like, and how to achieve it
•What 2020 will have in store for ransomware
Moderator: Dan Raywood - Speakers: Barry McMahon, James Gosnold
Authentication works to ensure that you’re you. As technology evolves and business needs change, authentication methods need to be more dynamic. Today’s workforce demands flexibly in areas such as device choice, work location, and levels of access so that they can deliver in their role. Yet security teams still need to keep the business safe and secure. This is why authentication must to adapt based to deliver for the employee and the security team.
On this webinar, we will look at the differences between two-factor authentication (2FA) and multi-factor authentication (MFA), assessing the strengths and weaknesses of both and what factors you can expect to use in both options. We will also look at going “Passwordless” and what that really means to the employee and the business.
• Why traditional two-factor authentication is no longer enough to protect your business
• What the differences are between 2FA and MFA
• The evolution of multi-factor authentication to include biometric and contextual factor
• The “Passwordless” future
There are a lot of file sharing and collaboration tools available today – both free and paid – and finding the solution that meets your business requirements can be difficult.
Sharing files and collaborating securely shouldn’t be tricky, but in practice, organizations can be met with diverse challenges as they seek to master the file collaboration process in a secure and effective way. However, if well-managed, file collaboration can bring significant business benefits and improve overall operability.
In this webinar, learn how to bring your file collaboration to the next level through security, flexibility and centralization.
•The importance of file collaboration for your organization
•How to master upload, download and collaborate files securely
•How to gain more control in cloud-based collaboration
Moderator: Dan Raywood - Speakers: Mike Campfield, Rik Turner, Deidre Diamond
Businesses these days face two main challenges: they have too much technology, and they don’t have the people to run and manage it. This has led organizations to come up with new ways to make their existing security resources more effective, and scale their existing human and technology resources in the face of increasing vulnerabilities.
In this webinar, we will discuss the challenges and opportunities facing security and IT teams when it comes to scaling their cybersecurity talent, how they can train and “upskill” staff members to fit with the problems of the enterprise.
•Why the issue shelfware has become a problem for businesses
•How to efficiently train and get staff the necessary skills
•How machine learning can help alleviate alert fatigue
•Strategies for increasing collaboration between Security and Network Operations teams
Dan Raywood, Infosecurity Magazine & Katie Moussouris.
Dan Raywood, Deputy Editor, Infosecurity Magazine sat down with Katie Moussouris, CEO, Luta Security at the RSA Conference 2020 to discuss bug bounty, patches, how companies are and/or should be managing security hygiene and more.
Moderator: Michael Hill Speakers: Dr David Day, Stuart Jackson and Maninder Pal Singh
AI has been predicted to be a future technology to keep a close eye on, bringing benefits for both a reduction in demands upon staff and better endpoint protection detection. However, is it something that your business can consider as we move into a new decade, and how can use you AI and predictive analytics to ensure your security posture is maximized without having to compromise user experience, mobility, and productivity better protect and fix your situational risk elements?
On this webinar, we will look at fresh predictions around AI, look at how it can fit into your business, what options exist for adoption, and how you can leverage adopt it for better situational protection and enable more intelligent security.
What the benefits and negatives of AI can be
How AI can identify behavioural and location patterns to determine certain risk factors enable location-based detection for increased security
Using situational awareness for device security and access
How AI enable better user experience
Are you manually transferring numerous files in your workplace? If so, you may be opening your organization up to various security risks and threats, not to mention potentially wasting valuable time and resources.
Although there are a plethora of file transfer tools available, many rely on outdated methods that no longer cut the mustard. The modern enterprise needs a centralized and securely automated approach to file transfer management.
This webinar will highlight the security risks of manual file transfer processes, explore the various benefits that automation can bring and explain how your organization can effectively and securely reinvigorate your file transfer management.
•The security risks and challenges that surround file transfer management
•Why automation is the key to fast, secure and effective file transfers
•How to ensure your organization is ahead of the game with its file transfer methods
Moderator: Dan Raywood - Speakers: Rob Acker, Gopalakrishnan Kary, Chris Oakley
A systematic approach to protecting key information assets is a powerful weapon in combating information risks by helping determine the types of security controls needed. This is where standards of cyber and information security come in, and ISO 27001 has been one of the most popular for many years.
In this webinar, we will look at how the ISO 27001 standard has come to be recognized as the international benchmark for information and cybersecurity practitioners, how to achieve it, and most importantly, what it takes to remain compliant.
What you need to consider to achieve ISO 27001 certification
How to maintain compliance with ISO 27001 and other standards such as ISO 27701 and ISO 27018
Top considerations and key lessons learned from information assurance
Moderator: Dan Raywood - Speakers: Nick Tausek, Joe Hancock. Andrew Hay
Security operations, automation and response (SOAR) has become an essential tool for security, as it reduces manual, repetitive tasks and enables analysts to have a better working process. This can be a force multiplier for your security operations center, making life better for them?
In this webinar, we will look at SOAR and where it can be used to make life easier for the analyst, what strategies you can use to have consistent processes that works and how to do more with less.
•What SOAR can mean for your business in 2020
•How to implement an automation strategy
•What SOAR strategies you can use to improve incident response
Moderators: Dan Raywood, Michael Hill, Speakers: Paul McKay, Brian Honan
As a new year and new decade are upon us, the same number of predictions are consistently made about what we can expect in the near and far future. Whether it is more malware, greater and stronger attacks or more problems, it seems that the future seems forever negative.
In this webinar, we will look at the various trends that have been predicted for the cybersecurity industry by the vendor and research communities, and evaluate what has come true in the past, and what we can genuinely expect the future to look like.
What the predictions for 2020 tell us about the coming year
What 2019’s predictions were, and what came true
Which platforms were predicted to be hit harder than they were
What leading researchers believe will be the key trends for 2020