Thursday, 18th May, 2023

How to Tackle the Rise of Highly Evasive Adaptive Threats

11:00 - 12:30 BST | UKI | Virtual

Event Overview

Digital acceleration has ushered in a new way of working: employees now spend most of their time working in the cloud, using SaaS applications and other web-based tools. However, in doing so, organisations are now struggling to manage a variety of new blind spots in traditional approaches to security that are not fit to protect modern working models. Consequently, there has been a surge in a new class of cyber threats known as Highly Evasive Adaptive Threats (HEAT).

This new class of threats evade detection by using techniques that leverage the web browser as an attack vector to gain initial access to the network and steal credentials or deploy malware, often ending in a full-blown ransomware attack. Largely unknown in the cybersecurity industry and unprotected against, HEAT were built specifically to compromise the shortcomings of traditional security tools.

DISCUSSION POINTS

  • The evolution of the threat landscape;
  • How to identify and quantify the risks to your organisation;
  • Strategies to stay ahead of the attackers.

Moderator

Anna Delaney

Director, ISMG Productions

ISMG

Brett Raybould

EMEA Solutions Architect

Menlo Security

Speakers

Join ISMG’s Anna Delaney for a moderated discussion that will feature insight from Brett Raybould, EMEA Solutions Architect, Menlo Security. 

This 90-minute session will be:
  • Chatham house rules
  • Peer driven
  • Pitch free

Watch brief video of the topic

Underwritten by

Menlo Security enables organizations to outsmart threats, completely eliminating attacks and fully protecting productivity with a one-of-a-kind, isolation-powered cloud security platform. It’s the only solution to deliver on the promise of cloud security—by providing the most secure Zero Trust approach to preventing malicious attacks; by making security invisible to end users while they work online; and by removing the operational burden for security teams. Now organizations can offer a safe online experience, empowering users to work without worry while they keep the business moving forward.

Rules of Engagement

By taking part in this discussion you agree that:

  • These events follow Chatham House Rule. Nothing shared will be recorded or distributed anywhere online.
  • If for any reason you need to cancel your reservation, we ask you to let us know 48 hours prior to the event commencing so we can open your seat up to someone else.
  • These are interactive discussions, so we ask that all attendees participate in the discussion. If this is a virtual event, we ask all attendees to join via video.

Upcoming ISMG Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain

February 20, 2025

Managing Your Expanded Attack Surface Using Automation: The Security Promise

February 20, 2025

Securing the Modern Payment Rails

Upcoming ISMG Events

February 11-12, 2025

Virtual Summit: Cybersecurity Implications of AI

February 12, 2025

Have We Shifted Too Far Left? Engineering, InfoSec, and Customer Identity Ownership

February 20, 2025

MLOPs and the Role of Gen AI in Securing the Software Supply Chain