In May 2021, CMIT Solutions of Metrolina was caught in a major ransomware attack against one of their customers. Initially it started with an infected email attachment, but with additional actions it lead to 4000+ attacks on 200+ endpoints and servers in multiple locations.

Join us to hear how CMIT Solutions successfully fought off an advanced attack through the use of security technology and their own individual actions. Listen to what they learned through the experience and what changes they made moving forward.

Hear from Joan Goodchild, Senior Editor, Dark Reading, John Sawyer, Associate Director of Services IOActive, Inc. and Dmitriy Ayrapetov, Vice President Platform Architecture, SonicWall — our panelists will discuss:
• Methods cyber attackers often use to compromise your systems
• Tips to recognize well-disguised malware used in targeted exploits
• Actionable advice on how to respond quickly and effectively to attacks
• Understand how your security operations team can use actionable insight and methods for a quick response

Malware is a lucrative business in which cybercriminals expect a high return for their time and effort in coordinating and launching successful attacks, with a lot of effort being put into evasion of existing security tools.
Hear from IDG and SonicWall as they discuss cybersecurity industry’s pressing issues and trends. Our security experts will share insights about tomorrow’s malware landscape and ways to fight and stop these malware attacks.

Presented by Simon Wikberg, SonicWall Cybersecurity Expert, this webcast will explore how cybercriminals are leveraging the software-as-a-service business model to establish a rapidly growing ‘hacker economy.’ It will also include insights on new trends, define the MaaS/RaaS business model, and what you can do to protect your business with a dive into deep business data behind MaaS and known examples that have been uncovered.

Today’s networks have never been more diverse and distributed. Zero-trust architecture offers a modern approach for security to meet modern work designs and tackle the cybersecurity challenges facing organizations.

Survival and continued growth often mean expanding services beyond traditional areas, being more agile and embracing work-from-anywhere policies. Most organizations expect to be fully deployed with a zero trust architecture within two years.

Hear from Osterman Research and SonicWall security experts as we discuss the importance of Zero-Trust.
Learn about:
• Threats, trends, and current issues elevating the need for zero trust
• How organizations are planning and deploying a zero-trust architecture
• Best practices and solutions to support the move to zero-trust

How to Deal with Business Email Compromise

BEC attacks are a $1.8 billion dollar racket — and statistically, your business will be targeted sooner rather than later. While 73% of organizations admit they’re not confident in their ability to face these attacks, there are a number of steps you can take to thwart the imposters in your inbox

Gain insights from Osterman Research and SonicWall experts as we discuss:
• Why BEC attacks are more financially devastating than ransomware
• The tactics attackers use to masquerade as executives
• How good your existing cybersecurity solution might be at stopping these attacks (Hint: be worried)
• The steps your org can take now to avoid falling victim to BEC attacks

An Inside Look at the 2022 SonicWall Cyber Threat Report

Critical infrastructure attacks. Crypto pickpockets. Triple extortion. Ransomware delivered via snail mail.

From triple-digit spikes to new records to significant reversals, the stats found in the 2022 SonicWall Cyber Threat Report are stories unto themselves. But behind every stat is a wealth of trends, tactics and developments ranging from the encouraging, to the terrifying, to the bizarre.

Join SonicWall cybersecurity expert Immanuel Chavoya as he explores:
• The latest on ransomware’s meteoric rise
• The locations and industries most targeted in 2021
• Why we’ve reached an inflection point in the war on cybercrime
• Business Email Compromise, Supply Chain Attacks, and more

The 2022 SonicWall Cyber Threat Report offers deep analysis of large scale ransomware data, and offers insight into the cyberattacks that are cascading across different regions and verticals.

With attacks setting records across the board — and with 38% of advanced, emerging threats missed by traditional security tools — the future increasingly belongs to those who are willing to meet attackers head on.

Threat hunting is a critical component of a fortified security posture and helps mitigate attacks from hidden threats. Developing strong threat hunting strategies can even help you stop breaches before they occur.

Join Amiculum’s David Meredith and SonicWall’s Suroop Chandran as they explore the building blocks of a successful threat hunting program, including:
• The key steps of the threat hunting process
• The most common mistakes threat hunters make
• Valuable resources and tips on how to get started — and how to get better

An Inside Look at the 2022 SonicWall Cyber Threat Report

Critical infrastructure attacks. Crypto pickpockets. Triple extortion. Ransomware delivered via snail mail.

From triple-digit spikes to new records to significant reversals, the stats found in the 2022 SonicWall Cyber Threat Report are stories unto themselves. But behind every stat is a wealth of trends, tactics and developments ranging from the encouraging, to the terrifying, to the bizarre.

Join SonicWall cybersecurity expert Immanuel Chavoya as he explores:
• The latest on ransomware’s meteoric rise
• The locations and industries most targeted in 2021
• Why we’ve reached an inflection point in the war on cybercrime
• Business Email Compromise, Supply Chain Attacks, and more