Understanding Cyber Attacks on Remote Workers

Following the COVID-19 quarantines, companies made a massive shift to remote and home working – and created a new range of opportunities for cyber attackers. While early attacks focused on phishing and credential theft, today cyber criminals are compromising corporate data via home Wi-Fi, poorly secured endpoints, and vulnerable mobile devices. In this webinar, experts discuss some of the cyber attacks that have been made on end-users working from home, as well as exploits against remote systems and devices. You’ll also learn what you can do to detect such attacks before they can do damage to your corporate data, and how you can mitigate them so they don’t compromise your systems again.

Available:
On Demand
Duration:
1h 00min

Attend this webinar and you'll:

  • Learn how to reduce the attack surface created by the shift to working from home.
  • Discover new methods and strategies for protecting home users, their data, and the network(s) supporting them.
  • Be better able to identify potential loopholes and vulnerabilities, as well as techniques for neutralizing them.
  • Reduce the likelihood of one of your users getting phished, not to mention the potential for ransomware and other malicious attacks.

Featured Speakers

  • John Pironti
    John Pironti
    President
    IP Architects

    John P. Pironti is the President of IP Architects, LLC. He has designed and implemented enterprise wide electronic business solutions, information security and risk management strategy and programs, enterprise resiliency capabilities, and threat and vulnerability management solutions for key customers in a range of industries, including financial services, insurance, energy, government, hospitality, aerospace, healthcare, pharmaceuticals, media and entertainment, and information technology on a global scale for over 25 years.

  • Eric Schwake
    Eric Schwake
    Principal Product Marketing Manager
    Menlo Security

    Eric Schwake is a Principal Product Marketing Manager for Menlo Security solution stack. Before coming to Menlo Security Eric worked with the security products at Proofpoint and covered security products at Cisco and Symantec before that. Eric has over 17 years of information security experience with a range of positions from Technical Support to Sales to Product Marketing. Eric holds a CISSP certification.

  • Terry Sweeney
    Terry Sweeney
    Moderator
    Dark Reading

    Terry Sweeney is a Los Angeles-based writer and editor who's covered business technology for three decades. He's written about cyber security for more than 15 years and was one of the founding editors of Dark Reading. Sweeney has covered enterprise networking extensively, as well as its supporting technologies like storage, wireless, cloud-based apps and the emerging Internet of Things. He's been a contributing editor to The Washington Post, Crain’s New York Business, Red Herring, Information Week, Network World, SearchAWS.com, and Stadium Tech Report.

Sponsored By