Detecting and Mitigating Attacks on Remote Workers

COVID-19 forced a rapid shift to remote work in every enterprise –and created a green field for cyber attackers. Early attacks focused on COVID-themed phishing attacks, but today cybercriminals are finding new ways of compromising corporate data via home wi-fi, poorly-secured endpoints, and vulnerable mobile devices. In this webinar, experts discuss some of the cyber attacks that have been made on work-from-home end users, as well as exploits against remote systems and devices. More importantly, the experts discuss what you can do to detect such attacks before they can do damage to your corporate data, and how you can mitigate them so they don’t compromise your systems again.

On Demand
1h 00min

Attend this webinar and you will:

  • Get a rundown of the latest ways attackers are exploiting remote access
  • Learn what tools can improve your observability into remote endpoints
  • Be ready to refresh (or re-architect) your endpoint security for emerging threats and the future

Featured Speakers

  • Frank Aiello
    Frank Aiello
    Chief Information Security Officer

    Frank Aiello joined Maximus in August 2018 as the Chief Information Security Officer (CISO) responsible for overseeing and coordinating the information security program across the enterprise. He is a veteran leader with more than 27 years of business and technical experience specializing in information security, risk management, and regulatory compliance. Prior to joining Maximus, he was the CISO for the American Red Cross where he implemented a strategy focused on maturing its security program. He began his career in professional services, culminating in his roles as the Vice President managing the Washington, DC office for a mid-sized consulting firm and the Mid-Atlantic Technology practice leader for a Big 4 accounting firm. Over the years he consulted with large corporations across a variety of industries, including financial services, telecommunications, and energy, as well as Federal government agencies. Frank is a frequent speaker at national and regional industry events on information technology and risk management. In 2016 he was recognized within the industry as the ISE® Northeast People's Choice Award Winner and ISE® Northeast Executive Award Finalist. He holds his Master of Science degree in Software Systems Engineering from George Mason University, and a Bachelor of Science in Computer Science from Penn State University.

  • Chris Newton
    Chris Newton
    Security Architecture Manager

    Chris manages Security Architecture for Maximus, coordinating with IT and business leads to ensure security controls are consistently applied across the enterprise while adapting to meet the demands of a dynamic technology landscape. He has 15+ years working with highly secure systems, first as an active duty member of the US Air Force and later as a civilian. He specializes in systems integrations, security and vulnerability analyses, and risk assessments. He has a Master’s degree in Management of Secure Information Systems from George Mason University School of Business.

  • Brian Black
    Brian Black
    Distinguished Sales Engineer
    Deep Instinct

    Brian is a Philadelphia-based Distinguished Sales Engineer with 20+ years of experience in Cybersecurity and Intelligence. Brian leads Deep Instinct’s security engineering team, overseeing North and South American territories. He is a thought leader and technology evangelist with a wealth of knowledge on AI, Deep Learning, and Machine Learning. In his off time he can often be found on the lecture circuit giving talks around online security and state sponsored threat actors, when he’s not fishing or competing in online CTF hacking competitions.

  • Sara Peters
    Sara Peters
    Senior Editor
    Dark Reading

    Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad of other topics. She authored the 2009 CSI Computer Crime and Security Survey and founded the CSI Working Group on Web Security Research Law -- a collaborative project that investigated the dichotomy between laws regulating software vulnerability disclosure and those regulating Web vulnerability disclosure.

Sponsored By