Heute können Mitarbeiter von überall aus und jederzeit auf Unternehmensressourcen zugreifen. Die hybriden Arbeitsmodelle, die seit der Pandemie immer mehr an Beliebtheit gewonnen haben, werden sich auf lange Sicht durchsetzen. Das alles hat die IT-Landschaft für immer verändert und die Auswirkungen auf Netzwerke und die Sicherheit machen sich schon bemerkbar. Nehmen Sie am 20. April an der 8. Folge unserer MINDHUNTER-Reihe teil und erfahren Sie vom Sicherheitsexperten Stephan Kaiser, vor welche geschäftlichen und sicherheitstechnischen Herausforderungen die rasant wachsende Zahl von Remote-Mitarbeitern IT-Manager stellt.

L’accès à tout moment et en tout lieu a définitivement transformé le paysage informatique et les modes de travail hybrides issus de la pandémie sont amenés à rester. Cela a un impact évident sur le réseau et la sécurité. Rejoignez Laurent Meimoun, expert en sécurité, pour l’épisode 8 de notre série MINDHUNTER, le 21 avril prochain, et apprenez-en plus sur les défis organisationnels et de sécurité rencontrés par les responsables informatiques face à l’expansion rapide du travail à distance.

L’accesso ovunque e in qualsiasi momento ha cambiato definitivamente il panorama IT, e nel mondo post-pandemia il lavoro ibrido è ormai una realtà. Il suo impatto sulla rete e sulla sicurezza è evidente. Nell’episodio 8 della nostra serie MINDHUNTER, che si terrà il 22 aprile, l’esperto di sicurezza Paolo Melchiori parlerà delle sfide aziendali e di sicurezza che i responsabili IT si trovano ad affrontare a causa della rapida espansione del lavoro da remoto.

With attacks setting records across the board — and with 38% of advanced, emerging threats missed by traditional security tools — the future increasingly belongs to those who are willing to meet attackers head on.

Threat hunting is a critical component of a fortified security posture and helps mitigate attacks from hidden threats. Developing strong threat hunting strategies can even help you stop breaches before they occur.

Join Amiculum’s David Meredith and SonicWall’s Suroop Chandran as they explore the building blocks of a successful threat hunting program, including:
• The key steps of the threat hunting process
• The most common mistakes threat hunters make
• Valuable resources and tips on how to get started — and how to get better

Securing the endpoint is riddled with new challenges as most workforces have moved off premises and face a slew of new threats. Join this panel discussion to hear leading experts and thought leaders share their insights and tips for how companies can protect themselves using both known and newer methods and technology.

We’ll discuss:
– Redefining the endpoint in 2022
– ZTNA and other emerging security frameworks
– The challenge of BYOD devices, IoT devices in the modern workforce
– Evolving strategies to protect the endpoint

Panelists include:
Ateef Mulla, Regional Senior Solution Engineer & Cybersecurity Expert – SonicWall

Businesses are now spending $170.4 billion on information security annually, according to research from Gartner. Despite this huge investment, IBM’s annual security report found that the average cost due to a data breach rose from $3.86 million in 2020 to $4.24 million in 2021, the highest in 17 years. Headlines call out the latest victims, including some of the world’s biggest corporations. But how can businesses protect themselves when employees are scattered, data is exploding, and devices are proliferating?

In this expert panel, cybersecurity experts will discuss best practices for proactively protecting your organization from the most common threats, and what to do when a breach does occur.

Join us to explore:

— Preventing breaches from external and internal threats
— Tools and techniques for detection and response
— How the speed of response to a breach can minimize its effects
— Adapting breach protection to hybrid work models
— How modern architectures such as IoT and edge affect a breach prevention strategy

Panelists include:
Jeroen Hekelaar, Manager, Solutions Engineering EMEA, SonicWall
Carl Leonard, Cybersecurity Strategist, Proofpoint

Sources:
https://www.proofpoint.com/uk/resources/threat-reports/state-of-phish
https://www.proofpoint.com/uk/resources/e-books/legacy-dlp-crumbles-in-the-cloud
https://www.proofpoint.com/uk/resources/threat-reports/state-of-phish
https://www.proofpoint.com/us/resources/analyst-reports/gartner-market-guide-insider-risk-management

https://www.proofpoint.com/uk/resources/white-papers/voice-of-the-ciso-report

Der Zukunftsforscher Gerd Leonhard ist sich sicher: „Die Menschheit wird sich in den nächsten 20 Jahren mehr verändern als in den letzten 300 Jahren“. Erfahren Sie von dem Cybersecurity-Experten Fabian Freundt von SonicWall mehr über die Auswirkungen von 5IR auf die Gesellschaft und die Unternehmenswelt und wie bessere und effektivere Cybersecurity-Lösungen Sie vor den neuesten und komplexesten Cybergefahren schützen können.

Ciberseguridad preparada para la 5RI
Según afirma el futurista Gerd Leonard, “la humanidad cambiará más en los próximos 20 años de lo que lo ha hecho en los últimos 300 años”. Escuche al experto en ciberseguridad de SonicWall Borja de Hoz hablar sobre los efectos de estos cambios sobre la sociedad y las empresas, que han impulsado el desarrollo de una ciberseguridad mejor y más efectiva para hacer frente a los cibercrímenes más recientes y complejos.

Futurista e autore tedesco specializzato nel dibattito tra umanità e tecnologia Gerd Leonhard afferma che “l’umanità cambierà di più nei prossimi 20 anni che negli ultimi 300 anni”. In questo webinar, l’esperto di cybersecurity Federico Diamantini illustra l’impatto di questi cambiamenti sulla società e sulle aziende e propone lo sviluppo di una cybersecurity più efficace per affrontare i più recenti e complessi crimini informatici.

Selon le futurologue Gerd Leonhard, « l’humanité va davantage changer dans les vingt ans à venir qu’au cours des trois cents ans passés. » Rejoignez Laurent Meimoun, expert en cybersécurité SonicWall, pour analyser les impacts de ces changements sur la société et sur les entreprises, qui appellent le développement d’une meilleure cybersécurité, plus efficace pour affronter les cybercrimes de demain les plus complexes.