In May 2021, CMIT Solutions of Metrolina was caught in a major ransomware attack against one of their customers. Initially it started with an infected email attachment, but with additional actions it lead to 4000+ attacks on 200+ endpoints and servers in multiple locations.

Join us to hear how CMIT Solutions successfully fought off an advanced attack through the use of security technology and their own individual actions. Listen to what they learned through the experience and what changes they made moving forward.

Hear from Joan Goodchild, Senior Editor, Dark Reading, John Sawyer, Associate Director of Services IOActive, Inc. and Dmitriy Ayrapetov, Vice President Platform Architecture, SonicWall — our panelists will discuss:
• Methods cyber attackers often use to compromise your systems
• Tips to recognize well-disguised malware used in targeted exploits
• Actionable advice on how to respond quickly and effectively to attacks
• Understand how your security operations team can use actionable insight and methods for a quick response

Malware is a lucrative business in which cybercriminals expect a high return for their time and effort in coordinating and launching successful attacks, with a lot of effort being put into evasion of existing security tools.
Hear from IDG and SonicWall as they discuss cybersecurity industry’s pressing issues and trends. Our security experts will share insights about tomorrow’s malware landscape and ways to fight and stop these malware attacks.

Presented by Simon Wikberg, SonicWall Cybersecurity Expert, this webcast will explore how cybercriminals are leveraging the software-as-a-service business model to establish a rapidly growing ‘hacker economy.’ It will also include insights on new trends, define the MaaS/RaaS business model, and what you can do to protect your business with a dive into deep business data behind MaaS and known examples that have been uncovered.

Today’s networks have never been more diverse and distributed. Zero-trust architecture offers a modern approach for security to meet modern work designs and tackle the cybersecurity challenges facing organizations.

Survival and continued growth often mean expanding services beyond traditional areas, being more agile and embracing work-from-anywhere policies. Most organizations expect to be fully deployed with a zero trust architecture within two years.

Hear from Osterman Research and SonicWall security experts as we discuss the importance of Zero-Trust.
Learn about:
• Threats, trends, and current issues elevating the need for zero trust
• How organizations are planning and deploying a zero-trust architecture
• Best practices and solutions to support the move to zero-trust

The 2022 SonicWall Cyber Threat Report offers deep analysis of large scale ransomware data, and offers insight into the cyberattacks that are cascading across different regions and verticals.

With attacks setting records across the board — and with 38% of advanced, emerging threats missed by traditional security tools — the future increasingly belongs to those who are willing to meet attackers head on.

Threat hunting is a critical component of a fortified security posture and helps mitigate attacks from hidden threats. Developing strong threat hunting strategies can even help you stop breaches before they occur.

Join Amiculum’s David Meredith and SonicWall’s Suroop Chandran as they explore the building blocks of a successful threat hunting program, including:
• The key steps of the threat hunting process
• The most common mistakes threat hunters make
• Valuable resources and tips on how to get started — and how to get better