img

on-demand webinar

Data is your most valuable asset–but it’s also your most vulnerable. Despite putting thorough and rigorous defensive security measures in place, ransomware is still getting in and corrupting data, forcing organisations to pay massive ransom fees. The reality is that thicker walls are no longer enough.

Join security experts, Palo Alto Networks, Microsoft and more security leaders for a morning of virtual talks to learn about new cyber/ransomware threats, hacking tools, techniques and how even seemingly secure organisations can be laid bare. 

Watch On-Demand

By viewing this video, you are providing your express consent that your viewing history has been captured and may be shared with our affiliates or third-party providers that may also combine with other data they collect about you, e.g. your use of their services. We and our third-party providers may use this information to present you with offers, promotions, or other marketing that we think you'll find relevant.

Ransomware lessons learned from catching cyber criminals - Mikko Hyppönen

Mikko Hyppönen has led his team through some of the largest computer virus outbreaks in history. As a result, he has been involved in catching several online criminals. Join Mikko to hear about Ransomware's evolution, the modern gangs, how profitable this business is, how ransomware's industrialization affects the threat landscape, and more.

By viewing this video, you are providing your express consent that your viewing history has been captured and may be shared with our affiliates or third-party providers that may also combine with other data they collect about you, e.g. your use of their services. We and our third-party providers may use this information to present you with offers, promotions, or other marketing that we think you'll find relevant.

How to Strenghten your Security Posture with Zero Trust Data Security - Peter Elnegaard

Enterprises must turn their attention inward and look for ways to achieve protection from the inside out–and that starts with their data. In this session you’ll hear why threat impact analysis and sensitive data discovery are integral to the future of secure data management.

By viewing this video, you are providing your express consent that your viewing history has been captured and may be shared with our affiliates or third-party providers that may also combine with other data they collect about you, e.g. your use of their services. We and our third-party providers may use this information to present you with offers, promotions, or other marketing that we think you'll find relevant.

An assumed breach mindset - Sarah Armstrong-Smith

Join Microsoft’s Chief Security Advisor, Sarah Armstrong-Smith to learn more about the type of cyber threats, changes in tactics and techniques and the evolution of the cybercrime. Get insights on how you can adapt your strategy and defences beyond infrastructure.

By viewing this video, you are providing your express consent that your viewing history has been captured and may be shared with our affiliates or third-party providers that may also combine with other data they collect about you, e.g. your use of their services. We and our third-party providers may use this information to present you with offers, promotions, or other marketing that we think you'll find relevant.

Rubrik + Palo Alto Networks: Speed security response and ransomware recovery - Kyle van Schalwyk

Join Palo Alto Networks and Rubrik to learn how to automatically enrich threat investigations, accelerate ransomware recovery, and automate sensitive data classification. Learn how you can achieve an end-to-end security workflow across your IT environment.

SPEAKERS

img

Security & privacy Expert

MIKKO HYPPÖNEN

img

Chief Security Advisor

SARAH ARMSTRONG-SMITH

img
img

Account manager

PETER ELNEGAARD

Rubrik horizontal RGB logos
img

IT Operations Manager

FRANK KIRKENG

img
img

Sales Engineer

HELGE KVESETH

Rubrik horizontal RGB logos

img

systems engineer specialist

KYLE VAN SCHALWYK

img
Submit