Throughout history, sometimes truth ends up being even stranger than fiction. Today’s parade of multi-million dollar ransomware payout headlines is no exception: cybercriminals and ransomware gangs are outgunning prevention tech and response strategies. Attackers are operationalizing exploits at a record rate, targeting more organizations and are operating to reduce dwell time.
10:00AM EST / 14:00 GMT / 15:00 CET
For Defenders, the challenge is that adversaries attack companies, not individual users or assets. It doesn’t matter if it’s an email inbox, remote asset, cloud account, or container workload. If it’s under attack, in our remote yet ever-connected world, that initial access can lead to broader compromise
Join us for a look at top ransomware attack trends we’ll see in 2022, what an attack chain looks like, and the Defender’s view inside our AI-driven Cybereason XDR. You will learn:
- How attackers can gain initial access, with and without macros
- A live view into an end-to-end modern attack chain
- Critical integrations and use-cases to guide your threat detection strategy
- A look at Cybereason XDR powered by Google Cloud
NOTE: Attending these sessions qualifies you for a Continuing Professional Education (CPE) credit, a requirement to maintain CISSP certification. To receive credit, attend the full live session to receive your confirmation email of attendance.