E-rate season 2021 opens July 1, but it’s no longer the only game in town. With so many options for K-12 funding available today, planning and applying has never been more complex … or more rewarding. Join us as we share the secrets to applying for E-rate, GEER, ESSER/ESSER II and more, including eligibility requirements and tips on how to maximize the amount and impact of your award.
Presenters: Holly Davis, CEO Business Consulting and Marketing, Komplement
Loren Wiege, Director of Global Programs, SonicWall
Srudi Dineshan, Product Marketing Senior Mgr., SonicWall

Known mostly for gaming, Discord has become a powerful gathering place for the hackers of tomorrow. Some of them are using your business as a proving grounds to hone their skills–whether for fun or for profit–and others are trying to stop them.

Which side will win? The one that we feed.

Join SonicWall Senior Strategist Brook Chelmo as he highlights why the next generation of hackers are more ambitious, better equipped and more effective than any that preceded them—and reveals what we can do to ensure these talented youths become allies, not adversaries.

In May 2021, CMIT Solutions of Metrolina was caught in a major ransomware attack against one of their customers. Initially it started with an infected email attachment, but with additional actions it lead to 4000+ attacks on 200+ endpoints and servers in multiple locations.

Join us to hear how CMIT Solutions successfully fought off an advanced attack through the use of security technology and their own individual actions. Listen to what they learned through the experience and what changes they made moving forward.

Malware is a lucrative business in which cybercriminals expect a high return for their time and effort in coordinating and launching successful attacks, with a lot of effort being put into evasion of existing security tools.
Hear from IDG and SonicWall as they discuss cybersecurity industry’s pressing issues and trends. Our security experts will share insights about tomorrow’s malware landscape and ways to fight and stop these malware attacks.

Hear from Joan Goodchild, Senior Editor, Dark Reading, John Sawyer, Associate Director of Services IOActive, Inc. and Dmitriy Ayrapetov, Vice President Platform Architecture, SonicWall — our panelists will discuss:
• Methods cyber attackers often use to compromise your systems
• Tips to recognize well-disguised malware used in targeted exploits
• Actionable advice on how to respond quickly and effectively to attacks
• Understand how your security operations team can use actionable insight and methods for a quick response

Presented by Simon Wikberg, SonicWall Cybersecurity Expert, this webcast will explore how cybercriminals are leveraging the software-as-a-service business model to establish a rapidly growing ‘hacker economy.’ It will also include insights on new trends, define the MaaS/RaaS business model, and what you can do to protect your business with a dive into deep business data behind MaaS and known examples that have been uncovered.

How to Deal with Business Email Compromise

BEC attacks are a $1.8 billion dollar racket — and statistically, your business will be targeted sooner rather than later. While 73% of organizations admit they’re not confident in their ability to face these attacks, there are a number of steps you can take to thwart the imposters in your inbox

Gain insights from Osterman Research and SonicWall experts as we discuss:
• Why BEC attacks are more financially devastating than ransomware
• The tactics attackers use to masquerade as executives
• How good your existing cybersecurity solution might be at stopping these attacks (Hint: be worried)
• The steps your org can take now to avoid falling victim to BEC attacks

Today’s networks have never been more diverse and distributed. Zero-trust architecture offers a modern approach for security to meet modern work designs and tackle the cybersecurity challenges facing organizations.

Survival and continued growth often mean expanding services beyond traditional areas, being more agile and embracing work-from-anywhere policies. Most organizations expect to be fully deployed with a zero trust architecture within two years.

Hear from Osterman Research and SonicWall security experts as we discuss the importance of Zero-Trust.
Learn about:
• Threats, trends, and current issues elevating the need for zero trust
• How organizations are planning and deploying a zero-trust architecture
• Best practices and solutions to support the move to zero-trust

An Inside Look at the 2022 SonicWall Cyber Threat Report

Critical infrastructure attacks. Crypto pickpockets. Triple extortion. Ransomware delivered via snail mail.

From triple-digit spikes to new records to significant reversals, the stats found in the 2022 SonicWall Cyber Threat Report are stories unto themselves. But behind every stat is a wealth of trends, tactics and developments ranging from the encouraging, to the terrifying, to the bizarre.

Join SonicWall cybersecurity expert Immanuel Chavoya as he explores:
• The latest on ransomware’s meteoric rise
• The locations and industries most targeted in 2021
• Why we’ve reached an inflection point in the war on cybercrime
• Business Email Compromise, Supply Chain Attacks, and more

The 2022 SonicWall Cyber Threat Report offers deep analysis of large scale ransomware data, and offers insight into the cyberattacks that are cascading across different regions and verticals.