From ransomware to passwords to social engineering, cyber criminals are always looking for and finding an angle to exploit. Here are five of our most recent webinars to help you respond to some of the more commonplace digital attacks, as well as proactively defend against them.

Understand Your Attackers: The Role of Sandboxing in Threat Intelligence

In the face of a rapidly evolving threat landscape, understanding attackers and proactively mitigating threats has become imperative. Michael Bourton, Senior Security Solutions Engineer at VMRay delves into the symbiotic relationship between sandboxing technologies and cyber threat intelligence (CTI), emphasizing the use of dynamic malware analysis to gain a deeper understanding of attackers and fortify organizational defenses.

Ransomware Deep Dive: To Pay or Not to Pay?

Colonial Pipeline, CNA Financial, JBS Foods, Garmin, and Travelex. All were publicly declared victims of high-profile ransomware attacks. All paid ransoms. However, did these companies do the right thing by paying ransoms as a means to recover or did paying contribute to encouraging more attacks? Steve Piper, CISSP – Founder & CEO of CyberEdge, examines ransomware trends, evaluates key factors that go into deciding whether to pay ransoms and reviews technologies to help give security teams the upper hand.

Embracing a Passwordless Tomorrow: Unveiling the Future of Passwords

Joe Carson, CISSP – Chief Security Scientist and Advisory CISO at Delinea shares valuable research insights along with practical strategies to contextualize the findings, including dispelling common password myths and exploring how Privileged Access Management (PAM) is evolving to address evolving needs. From navigating the intricacies of workflow, technical nuances, and compliance imperatives to crafting a forward-looking strategy for password management.

Hack the Brain: Social Engineering Innovation

The human factor remains a gateway for cybercriminals as phishing and ransomware attacks continue to increase. Cases like those of Uber and Rockstar Games have also shown how cybercriminals are evolving at a rapid pace, exploiting human psychology and our emotions - and hacking our brains. But how do attackers use behavioral science specifically against us? What can we do to protect those around us? Goncalo Gaiolas, CPO at SoSafe looks at social engineering innovations from the last year, explaining the latest strategies cybercriminals are using.

Ransomware in the Wild: Lessons Learned

The ransomware scourge continues to plague the cybersecurity industry. To help ensure you and your company are better prepared, Adrian Sanabria, IANS Faculty, shares insights and lessons learned from ransomware case studies. From what went right (and wrong) in a series of case examples to how best to incorporate that experience into your own defenses and program, threat actor behavior and how to take advantage of their own internal processes to thwart them, along with looking at the reality and best practices around backups and recovery.

You can find even more existing and upcoming webinars in our webinar archive. Viewing ISC2 webinars also entitles members to CPE credits.