Monthly Threat
Webinars

Presented by Jon Clay

This month:  Five-Year Celebration and Open Q&A with Jon Clay


Recorded July 28th, 2020 | On-Demand

Get Your Cybersecurity Questions Answered

In this month’s threat webinar, we wanted to shake things up to celebrate the five-year anniversary with an open Q&A session.

Ask me anything! What changes I’ve seen in the last 24 years in cybersecurity or what the latest threats we’re tracking against our customers—the list is endless. If you prefer, you can also submit a question now during registration.

See you there!



Jon Clay
Director: Global Threat Communications
Trend Micro

Jon Clay has worked in the cybersecurity space for over 22 years. He is responsible for managing marketing messages and external publication of all threat research and intelligence within Trend Micro as well as different core technologies.  As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats.  

Read Jon's weekly blog, This Week in Security News, to stay up to date on the latest cybersecurity news and events.

14Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Miss a webinar? Catch up here:


2020

January:  Security Predictions for 2020
February: Anatomy of an Attack
March: Coronavirus is the Latest Lure for Attackers
April: The Latest on Ransomware Tactics and Targets
May: Threats Targeting Web Applications
June: Shifts in the CybercriminalUndergrounds


2019

January:  Making Sense of the Cloud, Containers, and Serverless
February:  Using AI/Machine Learning in Cybersecurity
March:  The Past, Present, and Future of Cyber Threats
April:  Bug Bounties and How They Help
May:  Trends in Email-Based Threats
June:  The Latest on Ransomware
July:  New Threats to Your Mobile Devices
September:  How 5 Cybercriminal Undergrounds Use IoT Attacks
November: What’s Up with Web Threats?


2018

January:  Latest Business Email Compromise Trends
February:  2017 Security Roundup—Look Back to See Forward
March:  Cybercriminal Operations Revealed
April:  The 5 Types of BEC Scams
May:  Cryptocurrency Threats
June:  Recent Mobile Threat Trends
July:  Fileless Malware Update
August:  Security Roundup Review
October:  Trends in Vulnerabilities and Exploits
November:  Targeted Attack Methods and Protections
December:  Security Predictions for 2019


2017

January:  Security Predictions for 2017
February:  2016 Security Roundup
March:  West Africa Cyber Underground
April:  Pawn Storm Cyber Espionage Group
May:  WCRY (WannaCry) Ransomware: Facts and Mitigation
June #1:  What You Need to Know About Linux Threats 
June #2:  Petya Ransomware: Facts and Mitigation
July:  Business Process Compromise
August:  Insider Threats Are Not What You Think
September:  Security Roundup – The Cost of Compromise
October:  How GDPR affects your organization
November:  Taking Steps Towards Secure Manufacturing
December:  Top 7 Security Predictions of 2018


2016

January:  Destructive Attacks to Critical Infrastructure
March:  Business Email Compromise
April:  0-Days & Virtual Patching
May:  Go From Hunted to Hunting
June:  Exploit Kits
August:  1H'16 Security Roundup
September:  Mobile Ransomware
October:  The Scariest Ransomware Families
November:  Crimeware as a Service (CaaS)


2015

July:  Recent Data Breaches
August:  Latest Web Threats
September:  Cybersecurity News
October:  2016 Security Predictions
November:  Findings from the FBI Special Guest
December:  Top Vulnerabilities

Improved Security

Upgrade to Trend Micro Deep Security 12 to improves upon our leading threat detection and prevention, including:

Advanced container traffic scanning: Including inter-container “East-West” traffic
• Enriched real-time integrity monitoring: Capturing additional telemetry data to provide more context and information for detections and investigations
• Automatic anti-malware engine updating: Ensuring up-to-date anti-malware protection without manual intervention or system reboot


Extended Platform Support

Trend Micro continues to update our extensive platform and database support, including agentless anti-malware support for VMware® NSX-T.  More info here > (placeholder link)


Simplified Management

Your upgrade to Deep Security 12 makes it easier to manage your daily security operations, giving you:

• Automated cleanup of inactive agents: Ensuring optimal performance
• Upgrade on activation of agents: Removing the need for manual upgrading
• New RESTful APIs: Enabling automated provisioning and management of security

Visit the Automation Center for more information >

Deep Security 12 also improves your upgrade experience:

• Anti-malware protection remains during the entire agent upgrade process
• In agentless environments you can now automatically upgrade Deep Security Virtual Appliances, reducing the need for complex manual upgrades

Full Lifecycle Container Security

Deep Security 12 delivers additional protection for your runtime containers, including anti-malware and IPS, with inter-container traffic scanning. Additionally, you can secure your Docker and Kubernetes environments with the same Deep Security agent, leveraging distinct IPS, integrity monitoring, and log inspection rules.

Trend Micro Deep Security™ Smart Check supplements the full-stack runtime protection provided by Deep Security 12 and provides continuous image scanning for the software build pipeline, ensuring protection across the container lifecycle.

24Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.