Tuesday, March 1, 2016

Monthly Threat Webinar Series with Jon Clay

Twitter_Monthly-Threat-Webinar_Q2-2015

Every month I deliver a webinar that covers a threat topic that has recently been trending or has been requested by my audience.

In the past months I’ve covered:

  • The Use of Destructive Attacks on Critical Infrastructure (Featuring guest speaker Ed Cabrera, former CISO of US Secret Service and now Trend’s VP, Cybersecurity Strategist)
  • Latest threats to Data Centers & Cloud (Featuring Pawan Kinger, head of our Deep Security Labs)
  • Spearphishing: Tools and Tactics
  • Insights into the Deep Web

This month I am covering the latest trends in ransomware and more specifically, crypto-ransomware.  This threat has been affecting many organizations across the globe as threat actors have found it very successful and easy to use.  Our CTO, Raimund Genes rightly predicted that the use of extortion would increase in 2016, and so far we’re seeing this occur, whether done by crypto-ransomware, DDOS, or standard malware hijacking organizations systems and data.  Did you know that many of the spam campaigns conducted by the actors behind these attacks launch them between 8am – 2pm local time?  Below is a chart tracking this information from our backend threat intelligence, Smart Protection Network.

Doc6

his and a number of other interesting items are covered in the webinar:

  • Evolution of ransomware
  • Why is crypto-ransomware being used
  • The latest crypto-ransomware families, and what makes up their infection chain
  • Technologies to deal with each stage of the infection chain
  • Best Practices for end users, IT managers, and if compromised

I invite you to watch this webinar, and feel free to watch any of the previous monthly webinars in this series.  I also invite you to rate the webinar and give comments on any threats you’d like me to cover in future months.

Webinar Link: http://ift.tt/1RjEE8f

You can find all of the Trend Micro webinar’s here: http://ift.tt/1TP0Ify



from Trend Micro Simply Security http://ift.tt/1QpZDd4
via IFTTT

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.