NOW AVAILABLE ON-DEMAND

The 2022 SonicWall Cyber Threat Report revealed more than 20,000 Common Vulnerabilities and Exposures (CVEs) were published in 2021, the first time in history that the number of CVEs has passed the 20,000 mark. The most serious of these vulnerabilities, those scored above nine on the 10-point scale, become entry points for cybercriminals, and attackers are increasingly utilizing this means of entry to deploy ransomware and steal data.

Watch now to hear our expert cover:
– Exploited threat vectors and what to look out for
– Critical zero-days used to wreak havoc on businesses and governments
– Actionable insights for you and your organization

NOW AVAILABLE ON-DEMAND

Ransomware is down, malware is up, and global hotspots are shifting, but why? Watch now as we take you behind the scenes and tell the stories that shaped the mid-year update to the 2022 SonicWall Cyber Threat Report.

As organizations remain susceptible to ransomware attacks, you can head into the new year with the latest research on strategies for defending against attacks as well as how to recover after an attack.

True ransomware preparedness requires getting to know your security posture and then making it stronger, as well as creating a proactive action plan for the possibility that even these improved defenses could be breached.

Our SonicWall Threat and Detection Strategist uncovers the findings in the latest Osterman Research paper, Ransomware Attacks: Strategies for Prevention and Recovery. You’ll get actionable insights that include:

• Common set of realities found in 2022
• SWOT Analysis on Ransomware
• New strategies to defend against ransomware
• How to recover after an attack occurs

OUR PRESENTERS:
Immanuel Chavoya is a spokesperson and Senior Manager of the Product Security Incident Response Team (PSIRT) at SonicWall. As an advocate for Security, Immanuel has spoken at DefCon highlighting the importance of a building a product security program in his mission to make Zero-Days harder. Prior to SonicWall, Immanuel led mission critical security operations defending against Nation States and Advanced Threat Actors at NASA and Intuitive Surgical. Immanuel gives back to the security community through education and outreach as an Elected member of the Silicon Valley Information Security Association (ISSA), a not-for-profit serving the security community.

Michael is the Senior Analyst at Osterman Research, with broad interests in cybersecurity, data protection and information governance. Michael is the author of seven books on collaboration and user adoption, including Re-Imagining Productive Work with Office 365, User Adoption Strategies (2nd Edition), and Collaboration Roadmap. Michael holds a Master of Commerce with first-class honors in telecommunications-based IT from the University of Canterbury in New Zealand.

The 2022 holiday season is upon us, kicking off another massive year of phishing scams carefully crafted to do one thing: bait users into making bad decisions. Even the most savvy employees can fall victim to these scams.
Watch this panel discussion now on-demand. Our security experts examine real-world examples of advanced holiday phishing campaigns that have successfully bypassed security filters and reached users’ inboxes.
Our experts answer questions and provide actionable insights and best practices you can implement to avoid falling victim this holiday season, including how to:
– Know the common indicators of phishing
– Understand different forms of obfuscation methods
– Discern legitimate emails from fake ones
– Choose the right email content protection technologies

The future success of your cybersecurity programs rests on how well your organization can spot, understand and preemptively act against active vulnerabilities, phishing scams and human errors. The most dangerous of these often become entry points for your adversaries, whomever they may be. Attackers increasingly utilize these means of entry to deploy ransomware and steal data.

Our panel of presenters will discuss what you need to know to prepare your people, processes and technology for 2023:
• The zero-day economy and top exploited threat vectors
• What to watch out for and key indicators of compromise
• Actionable insight to reduce risk and threat surface

LIVE DISCUSSION between SonicWall and Osterman Research Cybersecurity Experts

Cybersecurity budgets are on the rise in 2023, enabling organizations to better combat increasingly prevalent and unpredictable cyberattacks. But more spending power is just the start: How should IT leaders focus their budgets for maximum impact? Osterman Research surveyed CISOs and CIOs at hundreds of medium and large organizations about their priorities — and their responses offer several actionable insights into how businesses are being secured in 2023.

During this webinar, the experts will discuss:
• What CISOs and CIOs are prioritizing — and why
• Which areas provide the greatest return on investment
• How much budgets will increase in the future (and why some will increase more than others)

Join SonicWall’s Threat Detection and Response Strategist as he dives into the 2023 SonicWall Cyber Threat Report, covering the importance of implementing key countermeasures to protect against cyber threats and to stay updated with the latest threat intelligence.

As cyber threats continue to evolve, it is essential for organizations to have a comprehensive understanding of the behaviors and tactics of threat actors in order to protect against potential attacks. This webinar covers the importance of implementing countermeasures based on coalesced yearly data on threat actor behaviors and tactics. By understanding and addressing the specific tactics and techniques used by threat actors, organizations can more effectively defend against cyber attacks.

ENHANCE THE HUMAN LAYER OF CYBERSECURITY

The first of this six-part series focuses on People and their role in the Importance of Three Categories of Protection. The 2022 Verizon Data Breach Investigations Report (DBIR) states that “82% of breaches involved the human element. Whether it is the use of stolen credentials, phishing, misuse or simply error, people continue to play a very large role in incidents and breaches alike.”

In this webinar, we will explore the importance of people’s role in the overall cybersecurity strategy. This School of Phish Master’s Program is ideal for security professionals, IT managers, business leaders, and anyone interested in learning about the latest cybersecurity trends and best practices, such as:

– How attackers have evolved and blended their tactics to target human elements
– The importance of frequent cybersecurity training for people within the organization
– The importance and value of managing operational cyber risk

Our webinar panelists bring a combined 50+ years of extensive security expertise, sharing hard lessons learned from their real-world experiences. And more importantly, they will share their insights and proven strategies, helping you prepare your response team to respond methodically and calmly.

Register today for all 6 parts of the Master’s Program!

KNOW WHAT TO DO WHEN A SUSPECTED EMAIL THREAT IS DISCOVERED.

Part two of this series delves into the importance of the organization’s operational processes as an integral part of its cybersecurity strategy. While technology and people often take center stage in most security practitioners’ conversations, the role of the process is an equally vital component in the three protection categories we cannot overlook.

This webinar explores how well-defined processes hardened the backbone of the organization’s security framework when correctly established. We will examine real-world examples and best practices to give attendees valuable insights into leveraging process-oriented strategies to:
– Manage risks better
– Increase operational efficiency
– Strengthen overall security posture

The School of Phish Master Program webinar series is thoughtfully prepared to help you better understand the various players behind the hacks, how they operate, and the necessary steps to stay ahead of your adversaries.

These steps are not considered a one-time task but an ongoing journey of continuous improvements that you can measure, tune, review, and repeat regularly. Why? Because your defenses need to evolve to keep pace with the advanced tactics threat actors utilize to exploit the three known weaknesses in your security – people, process, and technology.

Our expert panelists bring a combined 50+ years of extensive security expertise, sharing hard lessons learned from real-world experiences. And more importantly, they will share their insights and proven strategies, helping you prepare your response team to respond methodically and calmly. Whether you’re an IT professional, a security manager, or a business owner, this webinar series will provide you with valuable insights and actionable takeaways to better protect yourself and your organization from phishing attacks.

Your network is under more pressure than ever. As the number of connected devices expands, bandwidth demands continue to soar, making it difficult to consistently provide the secure, high-speed connection your business depends on.