Cybersecurity Webinar

Cybersecurity Webinar

by 460 460 people viewed this event.

Cybersecurity Webinar (Q&A available afterward)
Best Security Practices to Protect Your Organization.

According to the FBI, cyber-attacks are up 400% since the 2020. Even more concerning is that an increasing number of these attacks are being perpetrated by nation-states, state-sponsored actors, and organized crime syndicates. These groups have the knowledge, resources, and tools to carry out sophisticated and coordinated attacks that take advantage of weaknesses in systems and processes to compromise high-value assets and data, and disrupt business operations.

Many of these attacks exploit critical vulnerabilities that affect a large majority of businesses and organizations. Some examples of high severity vulnerabilities which attackers have frequently leveraged include:

  • Microsoft Exchange On-Premises (AKA “HAFNIUM”): Remote attackers gained access to hundreds of thousands of Exchange servers worldwide, including data and full system control, via a series of zero-day vulnerabilities.
  • Active Directory Domain Controller (AKA “ZEROLOGON”): Allows domain-joined computers to gain administrative privileges through basic tools such as PowerShell.
  • SolarWinds Orion (AKA “Sunburst” and “Supernova”): Attack on software-supply chain left armed, fully-patched systems with command-and-control malware.
  • VMware vCenter: Network-based web attack allows attackers to gain system-level access using basic tools.

This is just a small sample of some of the most critical vulnerabilities attackers have recently used to compromise banks, federal information processing systems, and mid-size enterprises. And it’s not just self-hosted systems that are under attack. Cloud-based systems, such as Microsoft Office 365, Azure, and Google face increasing threats to their infrastructure and applications.
​​​​​​​
​​​​We’ve been helping our clients build reliable and secure network and systems infrastructures for more than 20 years. Now, we’ve distilled our knowledge and experience into an informative and content-packed webinar to help you navigate today’s complex cybersecurity environment. Promenet’s lead security analyst, Ted Papaioannou, will share our strategies for protecting your network and sensitive data against known and unknown threats. Our agenda includes:

  • ​​​​​​​​​​​​​​Detecting compromises and attacks
  • Patching vulnerabilities and mitigating risk of zero-day attacks
  • Threats and threat modelingCloud and SaaS security
  • Encryption and extended authentication methods
  • Best practices and solutions for remote endpoint security
  • IT policies/procedures and vendor due-diligence
  • AI-based advanced threat protection and automated remediation
  • Incident response planning​​​This event is offered free of charge.

Space is limited, so please register online at: www.promenet.com/events/

Please don’t hesitate to contact us with any questions you may have about this webinar or any other IT-related matters. You can email support@promenet.com or call 212-968-0190. Please stay healthy and safe.

Event registration closed.
 

Date & Time

2024-03-13 @ 01:30 PM to 2024-03-13 @ 03:00 PM
 

Registration End Date

2024-03-12
 

Location

Online event
 

Share With Friends