Resources | SecureWorld

Cybersecurity: Hindsight 20/20 and Predictions for 2021

Written by SecureWorld News Team | 4 PM Z

Join Proofpoint and SecureWorld as we bring you a free online summit to review the biggest 2020 cybersecurity trends, examine the lessons learned, and explore top threat predictions for 2021. Our top industry experts will discuss real-world examples and best practices for protecting your company's most important assets: your people and your data!

All sessions will be eligible for CPE credits with ISC(2).

Keynote: Hindsight 20/20 and Predictions for 2021

2020 has brought many cybersecurity challenges many did not foresee. From protecting against worldwide pandemic-related threats to accommodating mass remote workforces overnight, many companies struggled with the new security risks while still maintaining business continuity. While hindsight is 20/20, businesses need to reexamine their cybersecurity strategies to better prepare for the coming new year.

Join our experts as they review real-world scenarios of cyber attacks from this year, deep dive into the top threats for next year, and explore how you can better protect your most valuable assets: your people and your data. In this session, we'll cover:

•  The most significant cyber trends and lessons learned in 2020
•  Top predictions for the threat landscape going into 2021
•  A people-centric approach to help support your security efforts

A New Social Engineering Combo: Email and Cloud Threats

Cybercriminals are increasingly blending both email and cloud vectors, whereby a single malicious email can lead to an infiltrated cloud account. Since 94% of data breaches start with attacks targeting people via email, organizations need a holistic approach and solution to combine security efforts across all channels. So how is this achieved? Proofpoint's threat research team found that Microsoft O365 has become attackers' playground. Legitimate filesharing abuse and OAuth token abuse by malicious 3rd party apps have become more common. Attackers are leveraging cloud platforms to host malicious applications and spread malicious files via email, resulting in email account compromise (EAC).

Join our experts as they expose how attackers use cloud services, like Microsoft SharePoint, to redirect people to phishing sites, phish for login credentials and Office 365 OAuth tokens, or compromise a cloud account to launch a BEC/EAC attack. In this session we’ll cover:

•  Trends and modern threat landscape
•  Case studies on how threat actors leverage legitimate cloud services to launch attacks
•  How to address these sophisticated hybrid attacks

Insider Threats, Data Loss Prevention, and Everything In-Between

Traditional DLP hasn't lived up to its promises. That's because data loss begins with people—whether they are negligent, compromised by external actors, or malicious insiders. Today, data loss prevention (DLP) and insider risk are top of mind for companies with a distributed workforce and increasing reliance on technology. So how can you better protect your organization?

Join our experts for a conversation on why organizations need to take a modern, people-centric approach that provides visibility and context into content, user behavior, and threat insights to mitigate this risk. In this webinar, you'll learn:

•  The importance understanding user risk profiles
•  How to better understand and respond to people-led data breaches
•  Real-world examples and best practices to improve your data and user security

Join for all the sessions or just the ones you have time for. Don't worry, we'll record them all for you should you prefer to check these sessions out on-demand.

For additional details, visit: https://go.proofpoint.com/cybersecurity-esummit-hindsight-predictions.html