On-Demand


Ransomware, phishing and data breaches are hacking methods that are often mistaken as cyber attacks independent of each other. It is more common that these attack techniques occur together as a cleverly coordinated and concerted action that can lead to problems for companies on several levels. At which points do hackers try to break into systems and what are the most common, sometimes even underestimated, risks these days? 

In this special edition webinar, we will also take a closer look at the recent Kaseya supply chain critical ransomware attack and share the corresponding Trend Micro Incident Response experience report.

Join us to learn more about the dark side of IT, gain a better understanding of how perpetrators act, what strategies they are pursuing, and what you can do about it:

  • Current cyber risks (from phishing to ransomware)
  • What made the Kaseya attack so effective and what this means for cyber defence 
  • Did nothing wrong and still a victim? These are the things you should know


Rense Buijen
Director Incident Response Europe at Trend Micro


Richard Werner
Cyber Security Consultant at Trend Micro

Trend Micro respects your privacy. Read our privacy policy.