Unveiling the Hidden Threat: Hybrid Attackers Leveraging Identities to Execute Ransomware

On-Demand Webcast|1 hour

A new breed of adversaries has emerged — hybrid attackers. These assailants have mastered the art of combining multiple attack vectors, exploiting vulnerabilities and leveraging identities to execute one of the most devastating cybercrimes of our time — ransomware. Ransomware is not just the end goal; hybrid attackers often use it as part of their arsenal to cripple organizations as their attacks progress.  

During this discussion, our experts will dive deep into the heart of the matter, shining a light on the problem that plagues modern cybersecurity — hybrid attacks. We'll explore why all contemporary cyberattacks are evolving into hybrid forms and how attackers skillfully manipulate identities as their weapon of choice. Understanding this crucial connection is the first step towards securing your digital assets and data. 

Don't miss this opportunity to learn more about the tactics, techniques and procedures employed by malicious actors to infiltrate and compromise organizations. You’ll walk away with practical insights on how to protect your organization from the grasp of ransomware and how to combat hybrid attackers with integrated signal, so you can find and stop identity-based attacks before they become breaches.

Speakers

Bill Brenner
VP, Content Strategy
CyberRisk Alliance

InfoSec content strategist, researcher, director, tech writer, blogger and community builder. Senior Vice President of Audience Content Strategy at CyberRisk Alliance.

John Mancini
Group Product Manager
Vectra AI

John Mancini leads the product management of machine learning-based threat detection algorithms at Vectra AI. He is a product-driven technologist with extensive experience research, development and design of software backed by machine learning and AI. Previously, John held the position of lead data scientist and received a patent for an improved method, system, and computer program product for identifying malicious payload exchanges which may be associated with payload injection or root-kit magic key usage. John earned his Ph.D in computational chemistry from Emory University and is an Emory University Quayle Fellow for his significant achievements in research

Sponsors

Vectra AI
0%