Cyber vulnerabilities are being exploited at breakneck speed, with Kroll identifying a 356% growth in the number of incidents where zero-days or freshly announced vulnerabilities were the initial infection vector, compared to Q3 2021. Adding stress to blue teams trying to manage patches and updates, remnants from attacks against Microsoft Exchange Servers from earlier in 2021 continue to be exploited even after the servers have been fully patched.
Join cyber threat intelligence leaders from Kroll and explore key insights and trends from over 3,200 cyber incidents handled worldwide in 2021. For added convenience, we’re hosting this virtual briefing in three time zones, with speakers including Keith Wojcieszek, Laurie Iacono and George Glass.
Attendees will learn:
The most prominent attack methods of 2021 and how these are shifting in recent months
Which vulnerabilities are most popular with ransomware actors, including how Log4Shell has started to appear in the wild?
The latest extortion tactics by threat actors and a worrisome trend of personal contact with relatives to drive pressure
How adversaries are leveraging exchange vulnerabilities (tied to ProxyLogon and ProxyShell) to conduct new attacks, even after servers have been fully patched?
Sessions Available
This virtual briefing will run at different time slots across February 16 and 17. Please register for the time slot that suits you the best.
Region |
Schedule |
Registration |
EMEA |
February 16, 2022 2:00 p.m. – 2:45 p.m. (GMT) |
|
Americas |
February 16, 2022 2:00 p.m. – 2:45 p.m. (EST) |
|
APAC |
February 17, 2022 4:00 p.m. – 4:45 p.m. (HKT) |