Implementing Lessons Learned from Threat Patterns on the Endpoint

  • Webcast Aired Tuesday, 09 Jun 2020 3:30PM EDT (09 Jun 2020 19:30 UTC)
  • Speakers: Jake Williams, Rajiv Raghunarayan

To quote Sun Tzu, \If you know the enemy and know yourself, you need not fear the results of a hundred battles." According to Verizon's DBIR, nearly 90% of successful endpoint compromises included ransomware, spearphishing, credential theft and social engineering. Technologies such as the browser are widely used and play a crucial role in early stages of many intrusions.

As businesses continue to adopt the cloud, and employees migrate to remote working, it is time to reconsider how we approach security. Traditional security models while useful, have stretched our resources and sometimes lulled us into a false sense of security. It's time to ask some basic questions, to revisit some basic assumptions.

Attendees at this webcast will learn: '

  • - Why do endpoint breaches still occur?
  • - How is the cloud changing our approach to security?
  • - Maximizing your security ROI when you live in the cloud
  • - How is the new normal affecting security?
  • - Do new technological models minimize risk?

Sponsor

CyberInc.png