Anytime, anywhere access heeft het IT-landschap voorgoed veranderd en hybride werken na de pandemie is niet meer weg te denken. De impact ervan op het netwerk en de beveiliging is bewezen. Sluit u aan bij beveiligingsexpert Jeroen Hekelaar, voor aflevering #8 van onze MINDHUNTER-serie op 21 april om meer te leren over de zakelijke en beveiligingsuitdagingen waarmee IT-managers momenteel worden geconfronteerd in deze snelgroeiende wereld.

Heute können Mitarbeiter von überall aus und jederzeit auf Unternehmensressourcen zugreifen. Die hybriden Arbeitsmodelle, die seit der Pandemie immer mehr an Beliebtheit gewonnen haben, werden sich auf lange Sicht durchsetzen. Das alles hat die IT-Landschaft für immer verändert und die Auswirkungen auf Netzwerke und die Sicherheit machen sich schon bemerkbar. Nehmen Sie am 20. April an der 8. Folge unserer MINDHUNTER-Reihe teil und erfahren Sie vom Sicherheitsexperten Stephan Kaiser, vor welche geschäftlichen und sicherheitstechnischen Herausforderungen die rasant wachsende Zahl von Remote-Mitarbeitern IT-Manager stellt.

With attacks setting records across the board — and with 38% of advanced, emerging threats missed by traditional security tools — the future increasingly belongs to those who are willing to meet attackers head on.

Threat hunting is a critical component of a fortified security posture and helps mitigate attacks from hidden threats. Developing strong threat hunting strategies can even help you stop breaches before they occur.

Join Amiculum’s David Meredith and SonicWall’s Suroop Chandran as they explore the building blocks of a successful threat hunting program, including:
• The key steps of the threat hunting process
• The most common mistakes threat hunters make
• Valuable resources and tips on how to get started — and how to get better

Securing the endpoint is riddled with new challenges as most workforces have moved off premises and face a slew of new threats. Join this panel discussion to hear leading experts and thought leaders share their insights and tips for how companies can protect themselves using both known and newer methods and technology.

We’ll discuss:
– Redefining the endpoint in 2022
– ZTNA and other emerging security frameworks
– The challenge of BYOD devices, IoT devices in the modern workforce
– Evolving strategies to protect the endpoint

Panelists include:
Ateef Mulla, Regional Senior Solution Engineer & Cybersecurity Expert – SonicWall

L’accesso ovunque e in qualsiasi momento ha cambiato definitivamente il panorama IT, e nel mondo post-pandemia il lavoro ibrido è ormai una realtà. Il suo impatto sulla rete e sulla sicurezza è evidente. Nell’episodio 8 della nostra serie MINDHUNTER, che si terrà il 22 aprile, l’esperto di sicurezza Paolo Melchiori parlerà delle sfide aziendali e di sicurezza che i responsabili IT si trovano ad affrontare a causa della rapida espansione del lavoro da remoto.

Ciberseguridad preparada para la 5RI
Según afirma el futurista Gerd Leonard, “la humanidad cambiará más en los próximos 20 años de lo que lo ha hecho en los últimos 300 años”. Escuche al experto en ciberseguridad de SonicWall Borja de Hoz hablar sobre los efectos de estos cambios sobre la sociedad y las empresas, que han impulsado el desarrollo de una ciberseguridad mejor y más efectiva para hacer frente a los cibercrímenes más recientes y complejos.

Businesses are now spending $170.4 billion on information security annually, according to research from Gartner. Despite this huge investment, IBM’s annual security report found that the average cost due to a data breach rose from $3.86 million in 2020 to $4.24 million in 2021, the highest in 17 years. Headlines call out the latest victims, including some of the world’s biggest corporations. But how can businesses protect themselves when employees are scattered, data is exploding, and devices are proliferating?

In this expert panel, cybersecurity experts will discuss best practices for proactively protecting your organization from the most common threats, and what to do when a breach does occur.

Join us to explore:

— Preventing breaches from external and internal threats
— Tools and techniques for detection and response
— How the speed of response to a breach can minimize its effects
— Adapting breach protection to hybrid work models
— How modern architectures such as IoT and edge affect a breach prevention strategy

Panelists include:
Jeroen Hekelaar, Manager, Solutions Engineering EMEA, SonicWall
Carl Leonard, Cybersecurity Strategist, Proofpoint

Sources:
https://www.proofpoint.com/uk/resources/threat-reports/state-of-phish
https://www.proofpoint.com/uk/resources/e-books/legacy-dlp-crumbles-in-the-cloud
https://www.proofpoint.com/uk/resources/threat-reports/state-of-phish
https://www.proofpoint.com/us/resources/analyst-reports/gartner-market-guide-insider-risk-management

https://www.proofpoint.com/uk/resources/white-papers/voice-of-the-ciso-report

Futurist Gerd Leonhard says that “Humanity will change more in the next 20 years than it has in the last 300 years”. Join SonicWall Cybersecurity Expert Neal Lewis to hear about the impacts of these changes on society and businesses, pushing new development of better and more effective cybersecurity to face the newest and most complex cybercrimes.

Futurista e autore tedesco specializzato nel dibattito tra umanità e tecnologia Gerd Leonhard afferma che “l’umanità cambierà di più nei prossimi 20 anni che negli ultimi 300 anni”. In questo webinar, l’esperto di cybersecurity Federico Diamantini illustra l’impatto di questi cambiamenti sulla società e sulle aziende e propone lo sviluppo di una cybersecurity più efficace per affrontare i più recenti e complessi crimini informatici.

Der Zukunftsforscher Gerd Leonhard ist sich sicher: „Die Menschheit wird sich in den nächsten 20 Jahren mehr verändern als in den letzten 300 Jahren“. Erfahren Sie von dem Cybersecurity-Experten Fabian Freundt von SonicWall mehr über die Auswirkungen von 5IR auf die Gesellschaft und die Unternehmenswelt und wie bessere und effektivere Cybersecurity-Lösungen Sie vor den neuesten und komplexesten Cybergefahren schützen können.