On-demand Webinar

XDR vs. Modern Ransomware Attacks

Thursday 17 March 14:00 GMT, 15:00 CET

Throughout history, sometimes truth ends up being even stranger than fiction. 

Today’s parade of multi-million dollar ransomware payout headlines is no exception: cybercriminals and ransomware gangs are outgunning prevention tech and response strategies. 

Attackers are (1) operationalizing exploits at a record rate, (2) targeting more organizations, and (3) are operating to reduce dwell time.

For Defenders, the challenge is that adversaries attack companies, not individual users or assets. It doesn’t matter if it’s an email inbox, remote asset, cloud account, or container workload. If it’s under attack, in our remote yet ever-connected world, that initial access can lead to broader compromise.

REGISTER

Attack Simulation: RansomOps vs. XDR

Join Cybereason for a look at top attack trends we’ll see in 2022, what an attack chain looks like, and the Defender’s view inside our AI-driven Cybereason XDR.

You will learn:

  • How attackers can gain initial access, with and without macros
  • A live view into an end-to-end modern attack chain
  • Critical integrations and use-cases to guide your threat detection strategy
  • A look at Cybereason XDR powered by Google Chronicle

Speakers

israel-hs-circle

ISRAEL BARAK

CHIEF INFORMATION SECURITY OFFICER, CYBEREASON

Israel Barak, CISO, is a cyber defense and warfare expert, with extensive background working for the government where he established and operated various cyber warfare teams. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, as well as research and analysis of current and evolving advanced threats.

eric-circle-hs

Eric Sun

DIRECTOR, EXTENDED SOLUTIONS, CYBEREASON

Eric Sun is a Product Director at Cybereason, focused on helping security teams measure and improve their resilience against modern threats. Eric works closely with the Nocturnus research team and global SOCs to understand emerging attack campaigns and evolving best practices. He brings a layer of behavior analytics and risk management from his many years in Asia as a professional poker player.

ken-westin-circle-hs

Ken Westin

DIRECTOR, SECURITY STRATEGY, CYBEREASON

Ken Westin has been in security for over 15 years working with companies on threat hunting, insider threat programs, and vulnerability research. In the past, he has worked closely with law enforcement helping to unveil organized crime groups. His work has been featured in Wired, Forbes, New York Times, Good Morning America, and others, and is regularly reached out to as an expert in cybersecurity, cybercrime, and surveillance.