Monthly Threat Webinar Series - February, 2020

Anatomy of an
Attack

In this webinar, I’ll share with you an example of an actual cybersecurity attack that occurred a while back. After taking deep dive into the cause, effect, and aftermath of the attack, I’ll also share some hands-on information and best practices to follow.

Join my monthly threat webinar and live Q&A session to learn:

  • How the attack was achieved, alongside the ways in which the victim responded.
  • Takeaways and best practices surrounding this and similar attacks.
  • Valuable insight into how you can minimize your risk of compromise.

Recorded February 27 | On Demand


#

Thank you. Check your email for details on your request.

About the Presenter



Jon Clay
Director: Global Threat Communications
Trend Micro

Jon Clay has worked in the cybersecurity space for over 23 years. He is responsible for managing marketing messages and external publication of all threat research and intelligence within Trend Micro as well as different core technologies.  As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats.  

Read Jon's weekly blog, This Week in Security News, to stay up to date on the latest cybersecurity news and events.

Section 1 - Column 2. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 1 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.