Throw Away the Key(logger): Strategies for Protecting Users from Malware
Despite your team’s best efforts to protect corporate systems from malware, users tend to click before thinking. At work, corporate security software may catch wind of an illegitimate download before it causes much damage. On personal devices, however, your employees have fewer layers of protection – and the same goes for consumers using your services.

Botnets can provide criminals with a complete picture of your users’ online activity, making it easy for them to impersonate victims and take over even well-protected accounts. An infection on an employee’s personal system can provide a stepping stone to sensitive corporate data or a pathway for delivering ransomware, while an infected consumer opens the door to online fraud. In either case, security teams often have limited visibility or recourse, given that the affected systems fall outside of corporate control.

In this roundtable, we’ll discuss why botnets are a problem enterprises must deal with now, and how your peers are successfully mitigating the effects of these insidious information stealers.

Discussion topics will include:

  • What effects are you seeing from malware/botnets?
  • How are you identifying infected users/employees today?
  • Do infected users factor into your ransomware prevention strategy?
  • What are you doing to combat botnets and ATO today?
  • How do you measure success?


Joining ISMG’s Tom Field to provide expert insight and case studies is Chip Witt, VP of Product Management at SpyCloud.
Aaron Cockerill
Aaron Cockerill
|
Chief Strategy Officer
Scott Ferguson
Scott Ferguson
|
Executive Editor
October 7, 2021 | 04:00 - 05:30 pm EDT
Sponsored By
SpyCloud

Using Human Intelligence, SpyCloud researchers recover exposed credentials early in the breach timeline, well before they become public. Our database of exposed credentials and PII is not only the largest in the industry – it offers the most current, relevant, and truly actionable data to protect users from account takeover. In fact, we’re the leader in account takeover prevention, protecting billions of consumer and employee accounts either directly or through product integrations. Our award-winning solutions proactively defeat fraud attempts and disrupt the criminals’ ability to profit from stolen information. See your real-time breach exposure details at spycloud.com.

ISMG Brands

ISMG’s 30 global media properties provide security professionals with industry and geo-specific news, research and educational events.

October 7, 2021 | 04:00 - 05:30 pm EDT

Throw Away the Key(logger): Strategies for Protecting Users from Malware