Catch the Intruder in his Tracks - Advanced Threat Hunting

panda

The threat landscape has evolved significantly over the past twenty plus years, this webinar will highlight these changes and reveal how threats have advanced. The latest security paradigm for the endpoint detection and response will be brought to light and the implications for organisations debated.
Watch Now

Spotlight

Cryptocurrency miners that infect the computers of unsuspecting users essentially operate according to the same business model as ransomware programs: the victim’s computing power is harnessed to enrich the cybercriminals. Only in the case of miners, it might be quite a while before the user notices that 70–80% of their CPU or graphics card power is being used to generate virtual coins. Encrypted documents and ransomware messages are far harder to miss. Cryptominers usually find their way onto user computers and corporate machines along with adware, hacked games, and other pirated content. What’s more, the present “entry threshold” — that is, the actual process of creating a miner — is rather low: cybercriminals are assisted by ready-to-use affiliate programs, open mining pools, and miner builders.

OTHER ON-DEMAND WEBINARS

Managing Cyber Security Risks

Ever wonder how businesses get exposed to cyber-attacks like ransomware, phishing, social engineering scams, and more? Is your organization vulnerable to these threats? If you are uncertain about the vulnerabilities in your business that could lead to a major loss in productivity, revenue… or worse… attend this webinar and learn how to identify risk factors and bolster your organization’s defenses.
Watch Now

Not sure that you need OT Cybersecurity? A Sentryo Assessment can quickly provide the data and guidance that you need

Sentryo

You don’t know what you don’t know. You suspect that your industrial environment is exposed and vulnerable but how can you be sure? How do you gain visibility and insights into your OT networks security risk posture? If the first step is understanding all of your assets and communications, how do you start? How many devices do you have on your industrial network? What talks to what? What talks to the outside world? Do you have vulnerabilities and weak spots? Is all of your firmware up to date? Sentryo is now working with our world-class partners to offer a unique Risk Assessment Service that provides the executives, managers, security analysts, automation engineers, compliance managers and all other IT, OT and management stakeholders in an organization clear analysis and insights about their cyber security posture highlighting the potential vulnerabilities and/or threats that require attention.
Watch Now

To Protect and Secure: Selling Cybersecurity as a Service

Auvik Networks

A new year brings new threats, new exploits—and new MSP opportunities in cybersecurity. Understanding global technology trends and cyberthreats like ransomware can help you successfully deliver security as a service to your clients. Auvik AVP of product management Patrick Albert talks with Tayler Feigl, Channel Development Manager, APAC at Datto to discuss key findings in Datto’s annual State of the Channel Ransomware Report, the result of interviewing 100,000 small to mid-sized business (SMBs) around the globe. You’ll hear what your MSP peers are doing to prepare, protect, and recover against ransomware, and investigate how you can use these findings to sell cybersecurity as part of your managed services offering.
Watch Now

Palo Alto Networks & CyberX Integration: Accelerating the Time Between ICS/SCADA Threat Detection and Prevention

CyberX

This SANS webinar discusses how to secure ICS and SCADA environments using the Palo Alto Networks Security Operating Platform and CyberX’s purpose-built ICS cybersecurity platform. Daniel Shugrue, Senior Director of Industrial Cybersecurity at CyberX, and Dharminder Debisarun, Industry Security Architect at Palo Alto Networks, describe how the Industrial Internet of Things (IIoT) is helping organizations improve safety, increase output, and maximize revenue, while at the same time digitalization is driving deployment of billions of IIoT devices and increased connectivity between IT and Operational Technology (OT) networks, increasing the attack surface and risk of cyberattacks on industrial control systems.
Watch Now

Spotlight

Cryptocurrency miners that infect the computers of unsuspecting users essentially operate according to the same business model as ransomware programs: the victim’s computing power is harnessed to enrich the cybercriminals. Only in the case of miners, it might be quite a while before the user notices that 70–80% of their CPU or graphics card power is being used to generate virtual coins. Encrypted documents and ransomware messages are far harder to miss. Cryptominers usually find their way onto user computers and corporate machines along with adware, hacked games, and other pirated content. What’s more, the present “entry threshold” — that is, the actual process of creating a miner — is rather low: cybercriminals are assisted by ready-to-use affiliate programs, open mining pools, and miner builders.

resources