Sciencefiction is werkelijkheid geworden. De metaverse is een nieuw virtueel en driedimensionaal ecosysteem waarin gebruikers met elkaar kunnen communiceren, werken, spelen, studeren en handelen. Er schuilen in deze droomwereld echter de vanouds bekende gevaren. Leer van René Bos, werkzaam als cybersecurity-expert bij SonicWall, hoe u iedereen veilig kunt houden in de virtuele en reële werelden.

Threat actors are more emboldened than ever, pushing effective phishing campaigns at an increasing rate in 2022. Their approach and methods continue to evolve. The crafting of malicious emails to effectively fool users is putting organizations at constant risk of a breach.

Listen to the panel discussion with our security experts to examine real-world examples of sophisticated phishing campaigns that reached users’ inboxes. They will offer insights and advice you want to take to avoid them.

According to Foundry, formerly IDG Communications, 92% of organizations currently host some or all of their mission critical applications and IT footprint in the cloud. But cloud environments continue to face a myriad of security threats including misconfiguration, lack of visibility, identity and unauthorized access.

In this panel discussion moderated by Clarify360’s Jo Peterson, tune into hear leading experts focus on specific takeaways that you and your team can put in place to now to ensure your cloud footprint is secure for the upcoming year.
– Cloud security roadmap;
– Cloud security posture management;
– Zero trust network access (ZTNA);
– SDLC and DevSecOps within the cloud;
– The need for centralized platforms;
– Increased investment in intelligent security;
– Increased investment in certification and cross training of your team.

Panelists:
Teena Piccone (Google)
Iain Clarke (PayPal Invest)
Charles Johnson (Coalfire)
Stan Davidson (SonicWall)

Obwohl die erste bekannte Ausgabe 2.000 Jahre alt ist, enthält Die Kunst des Krieges von Sunzi Strategien, die Ihre IT-Teams heute auf die Cybersicherheit anwenden können. Wir haben diese „Kunst“ untersucht, um besser zu verstehen, wie Militärstrategen ein traditionelles Schlachtfeld sehen und wie wir Ressourcen einsetzen können, um Angriffe von Ransomware-Gruppen oder staatlich geförderten Hackern sowie andere Bedrohungen effektiver abzuwehren. Erfahren Sie vom SonicWall-Cybersecurity-Experten Robert Wislsperger , wie wir die Strategien aus dem Buch Die Kunst des Krieges auf unsere Welt übertragen haben, in der die Cyberkriegsführung eine Realität ist.

Although the first known copy dates back 2,000 years, Sun Tzu’s Art of War book contains strategies that your IT teams can apply to today’s state of cybersecurity. We’ve studied the “art” to appreciate how military strategists may look at a traditional battlefield and deploy resources so that we’re more effective at sustaining attacks from ransomware gangs, state-sponsored hackers, and other threats. Learn from SonicWall Cybersecurity expert Tudor Florescu about how we translated the strategies of the Art of War into our world where Cyber Warfare is a reality

Bien que le premier exemplaire connu ait 2 000 ans, l’Art de la guerre de Sun Tzu contient des stratégies que vos équipes informatiques peuvent appliquer aujourd’hui à la cybersécurité. Nous avons étudié « l’art » pour comprendre comment les stratèges militaires considèrent un champ de bataille traditionnel et déployer nos ressources de manière à être plus efficaces pour faire face aux attaques des gangs de ransomware, des pirates informatiques sponsorisés par des États et d’autres menaces. Découvrez avec Guillaume Sevrin, expert en cybersécurité SonicWall, comment nous avons transposé les stratégies de l’Art de la guerre dans notre monde où la cyberguerre est une réalité.

Si bien la primera copia conocida se remonta a hace 2.000 años, el libro El arte de la guerra de Sun Tzu contiene estrategias que sus equipos de TI pueden aplicar al estado actual de la ciberseguridad. Hemos estudiado el “arte” para apreciar cómo los estrategas militares ven un campo de batalla tradicional e implementar recursos destinados a aumentar nuestra eficacia a la hora de hacer frente a ataques de grupos de ransomware, hackers con patrocinio estatal, y otras amenazas. Reserve su plaza y aprenda del experto en ciberseguridad de SonicWall Sebastián Yáñez cómo hemos traducido las estrategias del Arte de la guerra a nuestro mundo, en el que la ciberguerra es una realidad.

Sebbene la prima copia conosciuta risalga a 2.000 anni fa, il libro “L’arte della guerra” di Sun Tzu contiene strategie che i team IT possono facilmente applicare alla cybersecurity attuale. Abbiamo studiato questa ‘”arte” e il modo in cui gli strateghi militari valutano un campo di battaglia tradizionale e implementano le risorse, per capire come possiamo resistere più efficacemente agli attacchi di gruppi ransomware, hacker sponsorizzati da stati nazionali e altre minacce. In questo webinar Paolo Melchiori, esperto di cybersecurity di SonicWall, spiega come applicare le strategie dell’Arte della guerra al nostro mondo attuale, dove la guerra informatica è una realtà.

The 2022 holiday season is upon us, kicking off another massive year of phishing scams carefully crafted to do one thing: bait users into making bad decisions. Even the most savvy employees can fall victim to these scams.
Watch this panel discussion now on-demand. Our security experts examine real-world examples of advanced holiday phishing campaigns that have successfully bypassed security filters and reached users’ inboxes.
Our experts answer questions and provide actionable insights and best practices you can implement to avoid falling victim this holiday season, including how to:
– Know the common indicators of phishing
– Understand different forms of obfuscation methods
– Discern legitimate emails from fake ones
– Choose the right email content protection technologies

Join the SonicWall Threat and Detection Strategist as we uncover the findings in the latest Osterman Research paper, Ransomware Attacks: Strategies for Prevention and Recovery. You’ll get actionable insights that include:

• Common set of realities found in 2022
• SWOT Analysis on Ransomware
• New strategies to defend against ransomware
• How to recover after an attack occurs

OUR PRESENTERS:
Immanuel Chavoya is a spokesperson and Senior Manager of the Product Security Incident Response Team (PSIRT) at SonicWall. As an advocate for Security, Immanuel has spoken at DefCon highlighting the importance of a building a product security program in his mission to make Zero-Days harder. Prior to SonicWall, Immanuel led mission critical security operations defending against Nation States and Advanced Threat Actors at NASA and Intuitive Surgical. Immanuel gives back to the security community through education and outreach as an Elected member of the Silicon Valley Information Security Association (ISSA), a not-for-profit serving the security community.

Michael is the Senior Analyst at Osterman Research, with broad interests in cybersecurity, data protection and information governance. Michael is the author of seven books on collaboration and user adoption, including Re-Imagining Productive Work with Office 365, User Adoption Strategies (2nd Edition), and Collaboration Roadmap. Michael holds a Master of Commerce with first-class honours in telecommunications-based IT from the University of Canterbury in New Zealand.