How to stop network attacks from winning

George Dobrea May 2020

George Dobrea

Speaker George Dobrea,
Designation: Founder and CEO of XEDUCO Institute
Topic: How to stop network attacks from winning
Date of Webinar: 20th May, 2020
Time and Location: 2:30 pm IST | 01:00 pm Dubai Time | 11:00 am South Africa Time

Watch Now
Speaker Bio:
George is the Founder and CEO of XEDUCO Institute. He is a cybersecurity expert and a well-known technical instructor delivering consultancy and training programs for military, commercial or public organizations for more than 25 countries. Awarded by Microsoft year by year since 2005 as a Most Valuable Professional (MVP) for Cloud and Datacenter Security and by EC-Council as the ‘Instructor of The Year’ 2016, 2017 and 2018, he’s a popular speaker at technical conferences including Microsoft Ignite, TechED and Hacker Halted USA.

Topic Abstract:
The communication, sharing of data, business transactions, or in short, the entire trade and commerce industry is dependent on the network. Though the internet can network and connect the world-at-large, some people may attempt to damage and disrupt these networks repeatedly for various reasons. These attackers violate privacy and intrude internet-connected devices either to retrieve information or to make it inoperable.

The past months have seen some of the most frequent and severe cybersecurity attacks ever recorded against businesses in a variety of industries. As security professionals prepare to handle upcoming network breaches and data security risks, companies must make themselves aware of the latest cyber threats in circulation to ensure their security countermeasures are up to par.

In this webinar, we are identifying the top upcoming network security threats and how your enterprise can stay protected. Beside common types of dangerous networking attacks like malware attacks, ransomware, botnets, drive-by download, phishing, DDoS, crypto-jacking, Man-in-the-middle, and APT threats we are seeing an increasing number of new style attacks targeting IoT and cloud platforms and potentially using ML and AI tools to bypass the defensive protection barriers. As attacks become more sophisticated and as the pressure to protect enterprise systems and data grows significantly the defenders are increasingly implementing Zero Trust as a security concept relying on various existing technologies and governance processes to accomplish its mission of securing the enterprise IT environment.

As enterprises are facing modern cybersecurity issues – including networks that are increasingly cloud-native, with no perimeter and generating huge amounts of data – security experts say the traditional CIA security triad needs a DIE (distributed, immutable and ephemeral) model upgrade that could encourage the approach of security by design and minimize risk.

Attendee Takeaway:

  1. Types of network attacks and their stages.
  2. Learn how to protect your network from these attacks.
  3. The role of the Red Team when identifying vulnerabilities.

*Examples, analysis, views and opinion shared by the speakers are personal and not endorsed by EC-Council or their respective employer(s)


Share this post

Recent Posts

INQUIRE NOW

Related Posts

Are you looking to pursue a career in cybersecurity?

Unlock Your Cyber Security Potential at EC-Council University