Monthly Threat
Webinars

Presented by Jon Clay

This month:  Real Attacks on Cloud Infrastructure


August Webinar | On-Demand

Trend Micro is consistently ranked #1 by IDC in the Worldwide Cloud Workload Security Market Share. This means we monitor more threats and attacks on today’s cloud infrastructure than anyone else.

Join me, along with my colleagues—Pawan Kinger, Director of Trend Micro™ Deep Security™ Labs and Sr. Security Researcher Alfredo Oliviera—as we use this data to bring you the most comprehensive insight into real-world activity across these environments.

Watch my monthly threat webinar for:

Red-Circle-Check.png
An expert’s view of what we’ve observed across cloud infrastructures over the past few months
Red-Circle-Check.png A deep dive into the latest breed of container attacks
Red-Circle-Check.png Best practices on how your organization can minimize your risk of cloud attacks



Jon Clay
VP, Threat Intelligence at Trend Micro

Jon Clay has worked in the cybersecurity space for over 26 years. He is responsible for managing marketing messages and external publication of all threat research and intelligence within Trend Micro as well as different core technologies. As an accomplished public speaker with hundreds of speaking sessions around the globe, Jon focuses on the threat landscape and the use of big data in protecting against today’s sophisticated threats.

Read Jon's weekly blog, This Week in Security News, to stay up to date on the latest cybersecurity news and events.

14Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.

Miss a webinar? Catch up here:


2023

February:  Shifts in the Threat Landscape
March: 2022 Security Roundup Review
April: Email Threat Review
May: Cyber Risk Index Improves to Moderate Risk
June: ChatGPT: The Good, the Bad, the Ugly
August: What’s Next in Ransomware?


2022

January:  Fireside Chat: 2022 Cybersecurity Predictions  Passcode: SiTf8Cyx
February:  Spotlight on Cybercrime Campaigns
March: Cloudmining: Malicious Cryptomining of Cloud Servers
May: Assessing Cyber Risk
June: Business Email Compromise (BEC)
August: 1H’2022 Security Roundup
September: Cybercrime Essentials
October: 5 Scariest Cyber Threats Today


2021

January:  Security Predictions for 2021
February:  Attacks on Cloud Infrastructure
March: Dealing with Vulnerabilities and Exploits
April: Cyber Attack Trends and MITRE ATT&CK Framework
May: Home Network Attacks
July: All About Ransomware in 2021
August: Business Email Compromise
September: Mid-Year Security Report 2021
November: Recent Cyberattack Campaigns


2020

January:  Security Predictions for 2020
February: Anatomy of an Attack
March: Coronavirus is the Latest Lure for Attackers
April: The Latest on Ransomware Tactics and Targets
May: Threats Targeting Web Applications
June: Shifts in the CybercriminalUndergrounds
July: Five-Year Celebration and Open Q&A
September: 2020 Mid-Year Security Roundup
October: The Five Scariest Threats
November: Common Attack Methods Today
December: Malicious Uses of AI by Cybercriminals


2019

January:  Making Sense of the Cloud, Containers, and Serverless
February:  Using AI/Machine Learning in Cybersecurity
March:  The Past, Present, and Future of Cyber Threats
April:  Bug Bounties and How They Help
May:  Trends in Email-Based Threats
June:  The Latest on Ransomware
July:  New Threats to Your Mobile Devices
September:  How 5 Cybercriminal Undergrounds Use IoT Attacks
November: What’s Up with Web Threats?


2018

January:  Latest Business Email Compromise Trends
February:  2017 Security Roundup—Look Back to See Forward
March:  Cybercriminal Operations Revealed
April:  The 5 Types of BEC Scams
May:  Cryptocurrency Threats
June:  Recent Mobile Threat Trends
July:  Fileless Malware Update
August:  Security Roundup Review
October:  Trends in Vulnerabilities and Exploits
November:  Targeted Attack Methods and Protections
December:  Security Predictions for 2019


2017

January:  Security Predictions for 2017
February:  2016 Security Roundup
March:  West Africa Cyber Underground
April:  Pawn Storm Cyber Espionage Group
May:  WCRY (WannaCry) Ransomware: Facts and Mitigation
June #1:  What You Need to Know About Linux Threats 
June #2:  Petya Ransomware: Facts and Mitigation
July:  Business Process Compromise
August:  Insider Threats Are Not What You Think
September:  Security Roundup – The Cost of Compromise
October:  How GDPR affects your organization
November:  Taking Steps Towards Secure Manufacturing
December:  Top 7 Security Predictions of 2018


2016

January:  Destructive Attacks to Critical Infrastructure
March:  Business Email Compromise
April:  0-Days & Virtual Patching
May:  Go From Hunted to Hunting
June:  Exploit Kits
August:  1H'16 Security Roundup
September:  Mobile Ransomware
October:  The Scariest Ransomware Families
November:  Crimeware as a Service (CaaS)


2015

July:  Recent Data Breaches
August:  Latest Web Threats
September:  Cybersecurity News
October:  2016 Security Predictions
November:  Findings from the FBI Special Guest
December:  Top Vulnerabilities

Improved Security

Upgrade to Trend Micro Deep Security 12 to improves upon our leading threat detection and prevention, including:

Advanced container traffic scanning: Including inter-container “East-West” traffic
• Enriched real-time integrity monitoring: Capturing additional telemetry data to provide more context and information for detections and investigations
• Automatic anti-malware engine updating: Ensuring up-to-date anti-malware protection without manual intervention or system reboot


Extended Platform Support

Trend Micro continues to update our extensive platform and database support, including agentless anti-malware support for VMware® NSX-T.  More info here > (placeholder link)


Simplified Management

Your upgrade to Deep Security 12 makes it easier to manage your daily security operations, giving you:

• Automated cleanup of inactive agents: Ensuring optimal performance
• Upgrade on activation of agents: Removing the need for manual upgrading
• New RESTful APIs: Enabling automated provisioning and management of security

Visit the Automation Center for more information >

Deep Security 12 also improves your upgrade experience:

• Anti-malware protection remains during the entire agent upgrade process
• In agentless environments you can now automatically upgrade Deep Security Virtual Appliances, reducing the need for complex manual upgrades

Full Lifecycle Container Security

Deep Security 12 delivers additional protection for your runtime containers, including anti-malware and IPS, with inter-container traffic scanning. Additionally, you can secure your Docker and Kubernetes environments with the same Deep Security agent, leveraging distinct IPS, integrity monitoring, and log inspection rules.

Trend Micro Deep Security™ Smart Check supplements the full-stack runtime protection provided by Deep Security 12 and provides continuous image scanning for the software build pipeline, ensuring protection across the container lifecycle.

24Praesent non velit ut libero condimentum pulvinar sed vitae tellus.
Vestibulum id tristique elit. Suspendisse posuere rutrum sodales. Nam id elit ac sem iaculis lacinia posuere vitae metus.