We no longer support Internet Explorer

Please download one of these browsers:

Chrome Firefox Safari Microsoft Edge

Keep your browser version up-to-date for a fast, secure, web experience.

Skip to content
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
  • Solutions
    • CyberEd Essentials
    • CyberEd Pro
    • CyberEd Pro +
    • Enterprise
  • Insights
  • Pricing
  • Catalog
  • Contact Us
Back

Malware and Ransomware Defense

Search

Clear Expand Collapse

Cyber Defense During a Time of Crisis and After

In this session, Ran Shahor, IDF Brigadier General (Ret.), discusses the challenges organizations face during a time of crisis, the solutions, the holistic approach and the secret sauce needed in order to be protected, and stay ahead of the curve.

Course duration Duration: 25 minutes

Cyber Insurance with Lynn Peachey

Join Lynn Peachey in a three part series on Cybersecurity Insurance. Part 1 is an introductory exploration of the growing ransomware threat and the role of cybersecurity insurance. Part 2 is an exploration of the cyber insurance vendor's incident response process and finally part 3 is an exploration of risks and trends in cyber insurance.

Price
Course duration Duration: 2 hours, 47 min.

Cyber Insurance: The Best Defense Against Cyberattacks?

Join Deepika Mathur in an exploration of the extent to which cyber insurance fuels ransomware attacks.

Price
Course duration Duration: 20 minutes

Cyber Warfare A New Playbook

Join Matanda Doss, Ty Howard, Steve King, and Mike Manrod, in an exploration of the convergence of conventional, cyber, and information warfare. Learn about evolving Russian tactics, the role of perception warfare, and the need for integrated defense strategies in modern conflict.

Price
Course duration Duration: 30 minutes

Dealing With Evolving Attack Surface: Defender's Advantage

Join Sharda Tickoo in a discussion of the defender's advantage in dealings with evolving attack surfaces.

Price
Course duration Duration: 25 minutes

Defense Against Ransomware: Practical Application

This course emphasizes practical, actionable steps for any financial services institution's technical defenders to utilize in defense against ransomware.

Course duration Duration: 30 minutes

Fighting Ransomware in the Trenches

OPSWAT's Nandakumar Seshadri demonstrates ransomware attack scenarios and protection strategies using content disarm and reconstruction technology.

Price
Course duration Duration: 15 minutes

Intro to Ransomware in FinServ

Every financial sector business professional should have a basic understanding of ransomware threats. Kick off your ransomware journey today!

Course duration Duration: 15 minutes

IoT Attacks, Vulnerabilities & Prolific Risk

The Internet of Things (IoT) is expanding at a dramatic rate. As we connect our devices to more and more aspects of our daily lives, we are creating a roadmap for invasive listening, hacking and business disruption.

Course duration Duration: 30 minutes

Is Ransomware Evolving? Best Strategies for Security Leaders

Industry leaders Jayant Gupta, Mihirr P Thaker and Saloni Vijay discuss data resilience, third-party SLAs, and AI-powered threat detection for ransomware defense.

Price
Course duration Duration: 30 minutes

Jr Penetration Test - Theoretical

Join CyberSage for your hacker initiation and kick off your Penetration Testing journey today!

Course duration Duration: 2 hours

Lessons from 3 CISOs Who Battled Ransomware

Ian Thornton-Trump, Jon Staniforth and Heather Lowrie share their frontline experiences managing major ransomware attacks, offering practical strategies for incident response, stakeholder communication and recovery strategies.

Price
Course duration Duration: 35 minutes

Myth Busting a Move Toward Crypto Regulation

In 2021, we saw a steady drum beat toward mainstream adoption of cryptocurrencies by traditional financial institutions and investors of all sizes. We saw a move from a bitcoin-only world to an explosion of digital assets. And, we saw global regulators and policy makers begin discussions about building a clear regulatory framework for crypto.

Price
Course duration Duration: 30 minutes

Navigating the Risks of Social Engineering Attacks

Join Bob Slocum, Product Marketing Director at Tessian discusses the most sophisticated, real-world email social engineering attacks found by Tessian's threat intelligence team.

Course duration Duration: 15 minutes

Ransomware Evolution, Prevention and Mitigation

Fabrizio Pettinau, senior solutions engineer at Akamai, discusses ransomware's evolution into a sophisticated AI-enhanced industry, covering micro-segmentation, network visibility and rapid response strategies for organizational defense.

Price
Course duration Duration: 25 minutes

Secure Banking in 2023: The Next Big Innovation

Join Agnelo D'Souza, Anagha Mujumdar, Pradeep Kumar Rangi, and K M Reddy in an exploration of fintech, emergent tech and cybersecurity.

Price
Course duration Duration: 30 minutes

The C-Suite Debate on Tackling Cyber Extortion

Shailendra Kothavale, Steve D'Souza, Vijay Verma and Pradipta Patro debate the complexities of ransomware response and payment decisions.

Price
Course duration Duration: 25 minutes

The Future of Ransomware & Evolving Attacks

Join Troy Leach, Shannon Lawson, and Mike Manrod in a discussion of adaptations are needed to keep pace with the changing ransomware environment.

Course duration Duration: 30 minutes

The Perfect Storm: Cyber Readiness Exercise for FinServ

"The Perfect Storm" is an interactive team exercise for leadership, security leadership, IT, technical professionals, comms, legal and member support. Test your team's skills against relentless cyber threats!

Price
Course duration Duration: 1 hour, 30 minutes

Trust No File: Protection Against File-Borne Malware

Avinash Narasimhan explores strategies to secure file transfers, a critical yet vulnerable aspect of business operations. Learn to combat threats with layered protection, deep CDR technology in a zero trust framework, and next-gen sandboxing tools to safeguard files in transit and at rest.

Course duration Duration: 21 minutes

Search

Clear

  
Contact Us

+1-609-356-1499 | info@cybered.io | Sign Up for Our Newsletter

©2024 Information Security Media Group | About ISMG | Privacy & GDPR Statement