网络讲座系列

保险及保安图标

2022年及以后的网络保险

 

请求会话

    Many have questions about the recent changes to cyber insurance policies, 流程, 以及未来可能的变化. 加入施耐德唐斯网络安全团队, as they provide an update on the cyber insurance market by breaking down the numbers and sharing frontline insights from countless strategic discussions with business and technology leaders attempting to navigate the shifting landscape of modern cybersecurity.

  • A high-level understanding of the modern cybersecurity threat landscape
  • Relevant background information and insights regarding the recent changes to the cyber insurance market
  • Best-practices and strategic takeaways to prepare for potential future changes

勒索软件锁定图标

$1,000,000 Global Ransomware Lockdown: Chronicles of a Rapid Responder

 

请求会话

    Ransomware is one of the most devastating cyber-attack methods that exists today, and these attacks are seemingly getting more difficult to prevent and recover from. Does your organization have a plan for when the lights go out, 数据和系统不可用, 电话不工作了, 否则制造业就会戛然而止?

    加入施耐德唐斯网络安全团队, as they share a real-world experience of a massive ransomware attack that shut down a global business operation for many weeks. Our team will provide a stunning first-hand account of the realities of a well-coordinated and crafted ransomware attack from an international threat actor that has eluded law enforcement for many years.

  • An inside look at ransomware attacks by analyzing the tactics, 威胁行为者使用的技术和方法
  • An overview of the controls that could have prevented or detected the malicious actions
  • Accounts of lessons learned by those experiencing a modern cyber incident

扬声器图标

十大最常见的网络安全策略错误

 

请求会话

    加入施耐德唐斯网络安全团队 as they share insights from countless strategic discussions with business and technology leaders attempting to navigate the shifting landscape of modern cybersecurity. Many organizations still lack a comprehensive understanding of cybersecurity risks and with so many technical variables and threats, their cybersecurity strategy could find itself relying on thought 流程 that are outdated or based on false assumptions.

    From a penetration tester’s perspective; these strategic mistakes are often the root cause of significant compromises. 在这次演讲中, we will discuss several critical misconceptions and overlooked risks that may be lurking within your organization’s cybersecurity strategy and then review practical approaches to help reach an effective cybersecurity posture.

  • A high-level understanding of the modern cybersecurity threat landscape
  • A breakdown of common strategic shortcomings that can negatively impact an organization’s overall security posture
  • Best-practices and strategic takeaways to avoid falling victim to these strategic mistakes

解锁图标

黑客喜欢利用的10个漏洞

 

请求会话

    Press coverage of data breaches often focuses on the impact, but that’s only half the story. What if you could get a behind-the-scenes look at the underlying circumstances that resulted in these breaches? Our team of cybersecurity experts dedicate significant time and resources into maintaining a detailed understanding of advanced threat actor’s current capabilities and methodologies.

    We leverage this knowledge to help organizations of all sizes and industries to improve their ability to prevent and respond to cyber threat actors. Over the years, we’ve participated in countless penetration tests and incident response efforts. While every engagement has a unique set of circumstances, this presentation reviews the 10 most commonly exploited vulnerabilities in today’s cybersecurity landscape.

  • A high-level understanding of the modern cybersecurity threat landscape
  • 最有效的战术概述, techniques and procedures used by threat actors and pentesters alike to compromise organizations today
  • Best-practices and strategic takeaways to help prevent, detect and respond effectively

策略图标

Effective Strategies for Board Communications on Cybersecurity

 

请求会话

    Executives and board members alike are all keenly concerned about cyber-risks. Boards typically lack specific cyber-expertise but they've all seemingly read the same whitepaper on what questions to ask your CISO and/or Cybersecurity team. So why does it feel like a challenge to address their concerns and what is causing the communication gap?

    In this session, we will explore how to answer common tough questions such as "Are we secure?或者“我们被黑客入侵了吗??还有其他人. Attendees will walk away with proven methods and strategic ideas that will better prepare them for future discussions with board member and c-suite executive conversations.

  • A high-level understanding of the modern cybersecurity threat landscape
  • A breakdown of common strategic shortcomings that can negatively impact an organization’s overall security posture
  • Strategic takeaways and tangible steps to help improve board communication

Our team of experienced cybersecurity professionals offer a diverse range of speaking engagements covering topics from general cybersecurity best practices to industry specific needs. 会议可在现场和虚拟.

请求会话

bet9平台游戏