Intro and Overview

13th September
08:00am (BST)

1. How Cybercriminals and Malicious Bots Cause Data Breaches

13th September
08:30am (BST)

Sophisticated cybercriminals are increasingly using malicious bots to attack SaaS applications and cloud infrastructures. Recognizing the anatomy of bot attacks will help prepare you to defend against this constant threat. Learn about how our AI drastically improves our detection efficacy against modern bots.

How to Stop Malicious Bots Dead in Their Tracks
Gaining Full Visibility into Your Application Traffic
Protecting against dangerous API and supply chain attacks

2. Managing Account Takeover Risks

13th September
09:15am (BST)

Email remains one of the top-most threat vectors with organizations facing email breaches through sophisticated email threat types like account takeover. These types of breaches can wreak far greater havoc within an organization if not detected and mitigated immediately. Learn what an account takeover is, why they will persist, and our approach to prevent them.

The Massive Rise of Account Takeover Attacks
How the Persistent Nature of These Attacks Leads to Prolonged Data Breaches
Strategies on Detecting and Mitigation

3. Inspecting your Microsoft 365 Tenant Security

13th September
10:00am (BST)

If you have Microsoft 365 or an Azure subscription, then you have an Azure AD tenant. During this session, a Microsoft Cloud Security Solution Architect will highlight some of the default configurations within Azure AD. Using the Microsoft Identity Score as a starting place to prioritize security optimization, the discussion will turn to critical capabilities such as multi-factor authentication that will strengthen your overall identity and access controls. In addition to a variety of steps and checklists, the discussion will cover how you can begin to introduce modern techniques such as passwordless management to counter the rapidly changing security threat landscape.

4. Protecting Your Microsoft 365 Environment

13th September
10:45am (BST)

Creating a defense-in-depth security strategy for Microsoft 365 should encompass native and third-party cloud backup capabilities. This strategy facilitates compliance with increasingly challenging regulations, improves visibility into the data you are saving within your tenants, and speeds recovery in the case of intentional or accidental data deletion or corruption. Learn how our data protection solutions can secure your Microsoft 365 environment and protect your users from disaster.

Following Best Practices for Securing Your Microsoft 365 Data
Being Ready for the Worst-Case Scenario: Building a Disaster Recovery Plan
Implementing a Process for Addressing Sensitive Data in Your Organization

5. Understanding and Recovering from Credential and Data Theft

14th September
08:00am (BST)

Given the recent geopolitical conflicts, cyberattacks have evolved to be more destructive, especially those sponsored by nation-states. Understanding the differences between wiperware and ransomware and adjustments you can make with tools you may already have will help you better prepare and recover from these attacks.

Wiperware vs. Ransomware: Dealing with the new Threat Landscape
How to Protect Against Credential Theft, Phishing, and Vulnerability Exploitations
Using Data Protection to Secure and Recover Your Data and Workloads During a Disaster

6. Alert to Alarm – 24hrs of Log4J within Barracuda’s SOC

14th September
08:45am (BST)

Barracuda’s Managed XDR services evaluate thousands of security alerts daily. While a majority are benign, any particular one, such as Log4J, can be devastating for your environment if it is not recognized, isolated or remediated quickly. Hear from our Managed XDR Security Operations team lead on how we investigate, hunt, and ultimately respond to the small, but critical alarms that can disrupt any business.

Beyond the Endpoint: Understanding Managed XDR
Understanding Real-Time Monitoring and Incident Response
Taking advantage of a Managed SOC to Stay Secure

7. Shifting to a Zero Trust, Secure Service Edge Architecture

14th September
09:30am (BST)

In today’s hybrid work environment, from infrastructure to applications, zero trust is a fundamental element of your security posture. Adjusting to the new normal requires rethinking your approach to securing devices used to access your applications, data, and infrastructure. Understand various zero trust constructs, why it should be prioritized in your security projects, and where successful implementations begin.

Trust No User or Device Until Verified
The Security Perimeter Has Collapsed – Why ZTNA is a Must for Modern Networks
Secure Your Access from Any Device, Anywhere

8. Optimize Secure SD-WAN and Move to Secure Access Service Edge (SASE)

14th September
10:15am (BST)

Hybrid work patterns are driving renewed focus on Secure SD-WAN projects that strengthen security and optimize cloud connectivity. In addition, increased threats to critical infrastructure are accelerating Industrial IoT/OT security projects. Learn how you can secure your organization and build a roadmap to SASE.

Building a Resilient Foundation with Secure SD-WAN
Merging Your Network and Security to Build a Roadmap to SASE
Protecting What Really Matters: Securing Critical Infrastructure

This site is not supported in your version of Internet Explorer.
Please update your browser to view the site.