Home » Security Bloggers Network » Webinar: Live Attack Simulation – Ransomware Threat Hunter Series
Webinar: Live Attack Simulation – Ransomware Threat Hunter Series
Webinar: Live Attack Simulation – Ransomware Threat Hunter Series
October 25, 2021 |
1 minute read
Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response.
Join this session to learn more about how mature security teams can more competently deal with a modern ransomware operation and avoid a system-wide takeover by bad actors – delivered through a step-by-step walkthrough of an attack.
THURSDAY, OCTOBER 28TH
2:00 PM EST / 11:00 AM PST
ABOUT THE THREAT HUNTER ATTACK SIMULATION
This is a threat intelligence-driven event where we’re going to be emulating an adversary and showing you some approaches to think about/consider when protecting against that adversary. Beating modern ransomware attacks means not only preventing the ransomware payload from running, but also finding and addressing the malicious behaviors that come before it.
Our Nocturnus Research Team proactively researches and reverse-engineers new strains of ransomware – see our latest findings in action and why Cybereason arms you with fearless protection against ransomware to reduce risk across your enterprise. Cybereason allows defenders to detect earlier and remediate faster with one lightweight agent and an array of deployment options.
Join us for this in-depth hunter attack simulation to learn:
-
- Why ransomware continues to evolve and common delivery methods
- The differences and similarities between ransomware and other forms of malware
- Common methods attackers use to escalate their operations
- Reliable techniques Defenders can use to end active ransomware operators in their environments
Cybereason Security Team
The Cybereason Security Team champions cyber defenders by providing future-ready attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a Malop (malicious operation). The result: defenders can end cyber attacks from endpoints to everywhere.
Speakers
ISRAEL BARAK
CHIEF INFORMATION SECURITY OFFICER, CYBEREASON
Israel Barak, CISO, is a cyber defense and warfare expert, with extensive background working for the government where he established and operated various cyber warfare teams. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, as well as research and analysis of current and evolving advanced threats.
TIM AMEY
North America Field Chief Technology Officer, CYBEREASON
Tim Amey is a senior technologist with over 20 years of experience helping customers throughout North America solve complex security challenges in highly innovative ways. Serving as the Field CTO for North America, Tim joined Cybereason nearly 6 years ago. He is a trusted technical adviser for many of the world’s top security teams. Prior to Cybereason, he worked with industry-leading technology companies such as TippingPoint, Q1 Labs / IBM, F5, and Bromium.
JJ Cranford
PRODUCT MANAGER, CYBEREASON
JJ Cranford is part of Cybereason’s Product team at Cybereason primarily responsible for the go-to market strategy of the Cybereason platform of products for endpoint protection, detection and response. Prior to joining Cybereason, JJ spent nearly a decade at Guidance Software (later OpenText by acquisition), where he was responsible for the EnCase suite of products for endpoint security, DFIR and forensic investigations. JJ provides insight and expertise into market trends, industry challenges and solutions in the areas of ransomware protection, incident response, endpoint security, and risk management.
Related Posts
Never miss a blog
Get the latest research, expert insights, and security industry news.
Webinar: Live Attack Simulation – Ransomware Threat Hunter Series
October 25, 2021 |
1 minute read
Ransomware has the potential to affect any organization with exposed defenses. The challenges presented by a multi-stage ransomware attack to large organizations with a mature security team in place are unique and require an informed response.
Join this session to learn more about how mature security teams can more competently deal with a modern ransomware operation and avoid a system-wide takeover by bad actors – delivered through a step-by-step walkthrough of an attack.
THURSDAY, OCTOBER 28TH
2:00 PM EST / 11:00 AM PST
ABOUT THE THREAT HUNTER ATTACK SIMULATION
This is a threat intelligence-driven event where we’re going to be emulating an adversary and showing you some approaches to think about/consider when protecting against that adversary. Beating modern ransomware attacks means not only preventing the ransomware payload from running, but also finding and addressing the malicious behaviors that come before it.
Our Nocturnus Research Team proactively researches and reverse-engineers new strains of ransomware – see our latest findings in action and why Cybereason arms you with fearless protection against ransomware to reduce risk across your enterprise. Cybereason allows defenders to detect earlier and remediate faster with one lightweight agent and an array of deployment options.
Join us for this in-depth hunter attack simulation to learn:
-
- Why ransomware continues to evolve and common delivery methods
- The differences and similarities between ransomware and other forms of malware
- Common methods attackers use to escalate their operations
- Reliable techniques Defenders can use to end active ransomware operators in their environments
Cybereason Security Team
The Cybereason Security Team champions cyber defenders by providing future-ready attack protection that unifies security from the endpoint, to the enterprise, to everywhere the battle moves. The Cybereason Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a Malop (malicious operation). The result: defenders can end cyber attacks from endpoints to everywhere.
Speakers
ISRAEL BARAK
CHIEF INFORMATION SECURITY OFFICER, CYBEREASON
Israel Barak, CISO, is a cyber defense and warfare expert, with extensive background working for the government where he established and operated various cyber warfare teams. As Cybereason’s CISO, Israel is at the forefront of the company’s security innovation, as well as research and analysis of current and evolving advanced threats.
TIM AMEY
North America Field Chief Technology Officer, CYBEREASON
Tim Amey is a senior technologist with over 20 years of experience helping customers throughout North America solve complex security challenges in highly innovative ways. Serving as the Field CTO for North America, Tim joined Cybereason nearly 6 years ago. He is a trusted technical adviser for many of the world’s top security teams. Prior to Cybereason, he worked with industry-leading technology companies such as TippingPoint, Q1 Labs / IBM, F5, and Bromium.
JJ Cranford
PRODUCT MANAGER, CYBEREASON
JJ Cranford is part of Cybereason’s Product team at Cybereason primarily responsible for the go-to market strategy of the Cybereason platform of products for endpoint protection, detection and response. Prior to joining Cybereason, JJ spent nearly a decade at Guidance Software (later OpenText by acquisition), where he was responsible for the EnCase suite of products for endpoint security, DFIR and forensic investigations. JJ provides insight and expertise into market trends, industry challenges and solutions in the areas of ransomware protection, incident response, endpoint security, and risk management.
*** This is a Security Bloggers Network syndicated blog from Blog authored by Cybereason Security Team. Read the original post at: https://www.cybereason.com/blog/webinar-live-attack-simulation-ransomware-threat-hunter-series