Join the SonicWall Threat and Detection Strategist as we uncover the findings in the latest Osterman Research paper, Ransomware Attacks: Strategies for Prevention and Recovery. You’ll get actionable insights that include:

• Common set of realities found in 2022
• SWOT Analysis on Ransomware
• New strategies to defend against ransomware
• How to recover after an attack occurs

OUR PRESENTERS:
Immanuel Chavoya is a spokesperson and Senior Manager of the Product Security Incident Response Team (PSIRT) at SonicWall. As an advocate for Security, Immanuel has spoken at DefCon highlighting the importance of a building a product security program in his mission to make Zero-Days harder. Prior to SonicWall, Immanuel led mission critical security operations defending against Nation States and Advanced Threat Actors at NASA and Intuitive Surgical. Immanuel gives back to the security community through education and outreach as an Elected member of the Silicon Valley Information Security Association (ISSA), a not-for-profit serving the security community.

Michael is the Senior Analyst at Osterman Research, with broad interests in cybersecurity, data protection and information governance. Michael is the author of seven books on collaboration and user adoption, including Re-Imagining Productive Work with Office 365, User Adoption Strategies (2nd Edition), and Collaboration Roadmap. Michael holds a Master of Commerce with first-class honours in telecommunications-based IT from the University of Canterbury in New Zealand.

The future success of your cybersecurity programs rests on how well your organization can spot, understand and preemptively act against active vulnerabilities, phishing scams and human errors. The most dangerous of these often become entry points for your adversaries, whomever they may be. Attackers increasingly utilize these means of entry to deploy ransomware and steal data.

Our panel of presenters will discuss what you need to know to prepare your people, processes and technology for 2023:
• The zero-day economy and top exploited threat vectors
• What to watch out for and key indicators of compromise
• Actionable insight to reduce risk and threat surface

As hackers increase their ability and skills to collect and exploit our data when we are online, what can we do to stop them? Our Cybersecurity expert Alexis will explain that it starts by assessing your risk and controlling the threats with some spycraft, thinking of yourself as an onion and outstanding cybersecurity technology.

Webcast seriesAlors que les hackers aiguisent leurs connaissances et leurs compétences en collecte et exploitation de nos données lorsque nous sommes en ligne, que pouvons-nous faire pour les stopper ? Notre expert en cybersécurité Guillaume expliquera qu’il faut commencer par évaluer le risque et contrôler les menaces avec des méthodes d’espions, en utilisant la technique de l’oignon et en se dotant d’une technologie de cybersécurité hors pair.