Monthly Threat Webinar Series - September 2021

Mid-Year Security
Report 2021

Recorded September 30, 2021 | On-Demand


Each summer, Trend Micro Research analyzes the most significant threats and attacks from the past six months, providing a detailed report to better understand the latest threats targeting businesses so you can build an effective defense strategy.

As APTs, ransomware attacks, and zero-day exploits dominated first half of the year, we’ll take a look into where we expect cybercriminals to take these threats and how your organization can stay resilient.

Attend my monthly threat webinar and gain insight into:

  • The most significant threats that have occurred since January, alongside what you will likely see throughout the rest of the year
  • Tactics, tools, and common practices used in attacks
  • Best practices to follow in order to defend against current and future threats

#

About the Presenter



Jon Clay
Director: Global Threat Communications
Trend Micro

Jon Clay has worked in the cybersecurity space for over 25 years. He is responsible for managing marketing messages and external publication of all threat research and intelligence within Trend Micro as well as different core technologies.  As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats. 



David Sancho
Senior Threat Researcher,
Trend Micro

David Sancho joined Trend Micro in 2002, having fulfilled a variety of technical security-related roles. Currently, his title is Senior Anti-Malware Researcher and he specializes in web threats and other emerging technologies. In his more than 18 years of experience in the security field, Sancho has written and published a number of research papers on malware tendencies, has been featured in the media and has participated in customer events where he has presented on business issues and malware-related topics. His interests include web infection methods, vulnerability exploitation and white-hat hacking in general.

Section 1 - Column 3. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Section 1 - Column 4. Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.