Privacy and Security
Facebook Twitter LinkedIn

Privacy and Security

Combined Session
Thursday, November 10, 2022 14:00—15:00
Location: Wilhelm von Humboldt

Exploring the role of Endpoint Security in a Ransomware Resilience Plan

Ransomware attacks continue to increase in frequency and severity. Every organization needs a ransomware and malware resilience plan. Three major components of such plans should include deploying Endpoint Security solutions, keeping computing assets up to date on patches, and backing up data. In this session, we'll look at trends in ransomware as well as review the results of the KuppingerCole Leadership Compass on Endpoint Protection Detection & Response (EPDR) solutions.

Exploring the role of Endpoint Security in a Ransomware Resilience Plan
Event Recording
Exploring the role of Endpoint Security in a Ransomware Resilience Plan
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Exploring the role of Endpoint Security in a Ransomware Resilience Plan
Presentation deck
Exploring the role of Endpoint Security in a Ransomware Resilience Plan
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
John Tolbert
John Tolbert
KuppingerCole
  John Tolbert is a Lead Analyst and Managing Director of KuppingerCole, Inc (US). As Lead Analyst, John covers a number of different research areas, outlined below. John also advises...

NIS2 Directive – What It Is and Why You Need to Prepare

The EU NIS Directive (EU 2016/1148) which was aimed at achieving a common standard of network and information security across all EU Member States, is scheduled for an update.  All organization needs to take steps to improve their cyber resilience and the NIS2 directive provides a useful framework for this.  This updated directive will place obligations for cyber resilience on more organizations – you must check whether your organization is within its scope.  Whether or not this is the case you should take action to ensure that your organization’s resilience to cyber-attacks is adequate.  Even if the obligations of the directive do not apply, meeting them would help in this respect.

Attend this session to:

NIS2 Directive – What It Is and Why You Need to Prepare
Event Recording
NIS2 Directive – What It Is and Why You Need to Prepare
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
NIS2 Directive – What It Is and Why You Need to Prepare
Presentation deck
NIS2 Directive – What It Is and Why You Need to Prepare
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Mike Small
Mike Small
KuppingerCole
Mike Small is the retired director of security management strategy of CA, where he was responsible for the technical strategy for CA's security management software product line within Europe,...

Effects of Malware Hunting in Cloud environments

During this presentation, I’ll demonstrate the risks that a PDF can bring to your Cloud environment if it’s exploited by malware, I’ll be explaining how each session works within a binary, and explain how cyber attackers are using different techniques, like packers, obfuscation with JavaScript (PDF), demonstrating how these malware works and where it would be possible to locate the malicious code. At the end of this conversation, it will be clear to everyone how Dev/ Research should look better at their cloud environment, in addition to providing clear guidance on how people can seek more basic knowledge, with file structures, software architecture and language.

Effects of Malware Hunting in Cloud Environments
Event Recording
Effects of Malware Hunting in Cloud Environments
Click here to watch the recording of this session. Please note that this video is only available to event participants and subscribers. You'll need to log in to watch it.
Effects of Malware Hunting in Cloud environments
Presentation deck
Effects of Malware Hunting in Cloud environments
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Filipi Pires
Filipi Pires
Saporo
I’ve been working as Security and Threat Researcher at Saporo, and Cybersecurity Advocate at senhasegura, Snyk Ambassador, Application Security Specialist, Hacking is NOT a crime Advocate and...

Tickets

On-Demand Access
Re-live CSLS 2022
€100
 
Watch more than 90 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address