Don't Get Cyber Snagged: Recognizing and Reporting Suspicious Activity

Event details:

Thursday, October 20, 2022
On-Demand Webinar

Presenters:

Mark Sangster, Chief of Strategy at Adlumin
Kevin O’Connor, Director of Threat Research at Adlumin

About this talk:

Sophisticated criminals and state-sponsored actors rely on various phishing techniques to harvest sensitive data, steal credentials or deploy malware. Far too many companies and employees think phishing lures are obvious and easy to spot. Sophisticated cyber campaigns use previously stolen insider information and credentials to create legitimate-looking requests that appear to come from industry colleagues.

Watch industry expert and author Mark Sangster and Director of Threat Research Kevin O’Connor as they review emerging threats and attack techniques, unpack the latest exploitations, and discuss growing trends in the threat landscape.

What you will learn:

  • The latest phishing trends and tactics
  • How to identify suspicious activity and report it
  • How to build defenses to protect your employees in their office and home environments


Cybersecurity and AI: Managing the Evolution of the Threatscape

Event details:

Wednesday, September 21, 2022
On-Demand Webinar

Presenters:

Mark Sangster, Chief of Strategy at Adlumin
Diana Kelley, Chief Security Officer at Cybrize
Erick Galinkin, Principal Researcher at Rapid7
Nash Borges, VP of Engineering and Data Science at Secureworks

About this talk:

According to research by Capgemini, two-thirds of businesses now understand that AI is a necessary component in the race to secure your organization. The attack surface in 2022 is larger and more sophisticated than ever, with ransomware and breaches at an all-time high. The ability to detect cyber threats quickly, to have proactive security measures, and detect new, malicious threats, is more critical than ever.

In this month’s episode of ‘The (Security) Balancing Act,’ we ask, “Is AI the answer to the evolution of the threatscape?”

Watch on-demand as we discuss the following:

  • Use cases for AI in cyber – where does it fit?
  • Can AI replace cyber analysts?
  • What is the importance of resilient AI?
  • What do we mean by predictive intelligence and why is it important?
  • How can you implement AI into your security?
    • What technology can AI leverage to improve your security posture?
    • What is the future of AI in the cybersecurity space?



Tackling the Patching Pandemic to Protect Your Business

Event details:

Thursday, November 17, 2022
On-Demand Webinar

Presenters:

Mark Sangster, Chief of Strategy at Adlumin
Skylar Moran, Director of Customer Success at Adlumin

About this talk:

They say you’re only as good as your weakest link. Cybercriminals routinely use vulnerabilities in IT infrastructure to infiltrate the business, steal assets or launch massive ransomware attacks. Keeping up with vulnerabilities and patching requirements is already an IT challenge. With exploits like SolarWinds, Kaseya, and the Microsoft Exchange HAFNIUM, the problem only worsens.

Join experts from Adlumin as they tackle the patching pandemic, demonstrate simplified management of core systems, and learn how to avoid crippling attacks that exploit your defenses.

What you will learn:

  • Why do ransomware-as-a-service and the industrialization of cybercrime accelerate attacks, and how does this increase the number of adversaries who can enter the market?
  • What are some best practices for reducing cracks in your defenses that criminals often leverage?
  • How does Continuous Vulnerability Management create a centralized approach to patch management and identifying critical vulnerabilities?


Cybercrime – Working with the FBI: Become empowered. Not a victim.

Event details:

Tuesday, July 26, 2022
On-Demand Webinar

Presenters:

Mark Sangster, Chief of Strategy at Adlumin
Steve Lupo, Special Agent, FBI Houston Cyber Task Force/FBI SWAT

About this talk:

Cybercrime is a two-sided coin. On the one side, the industrialization of cybercrime and ransomware will operate with impunity. Meaning attack volumes and sophistication will continue to rise. On the other side, far too many organizations think they are not a target and are incapable of stopping sophisticated cyber adversaries.

Watch industry expert and author Mark Sangster and FBI Special Agent Steve Lupo as they dispel misconceptions, expose trends, and explore ways to work with law enforcement. Learn how to protect your business before it falls victim to the next headline-writing cyberattack.


Cybersecurity: Why It’s Not Just an ‘IT Problem’

Speakers:

Mark Sangster, Chief of Strategy at Adlumin
Mathew J. Schwartz, Executive Editor, DataBreachToday & Europe, ISMG

About this talk:

In an insightful video interview with Mark Sangster from Adlumin at RSA Conference 2022, discover the critical factors that go beyond backups and cyber insurance when it comes to cybersecurity breaches. Sangster discusses why many enterprises are unprepared for ransomware incidents, the limitations of backups and insurance, and how to establish a duty of defense. With his extensive industry experience and expertise, Sangster offers insights sought after by renowned publications like The Wall Street Journal and Forbes.




On the Trail of Bigfoot: Threat Hunting that Protects Your Business from Cyber Risks

Event details:

Wednesday, June 22, 2022
On-Demand Webinar

Presenters:

Mark Sangster, Chief of Strategy at Adlumin
Kevin O’Connor, Director of Threat Research at Adlumin

About this talk:

Malware poses a significant threat to businesses across all industries. Cybercriminals operate like Fortune 500 companies, optimizing their operations with superior technology and expertise and increasing revenue regarding ransoms and other illicit gains from their attacks. As criminals uplevel their ability to infiltrate and exploit your business, proactive threat hunting is non-negotiable for stopping malware-based attacks before they become business-disrupting or cripple operations.

Adlumin’s Chief of Strategy, Mark Sangster and Director of Threat Research, Kevin O’Connor, unpack real-life examples of how the company’s Threat Intel Team leverages observables and Indicators of Compromise (IoCs) to stop attacks in their tracks.