Cyber Risk Symposium

-
Register

3 one-hour CPE events, hosted by Jefferson Wells 
on October 4th. Our Cyber Risk & Security experts will be present three individual webinars focusing on the rapidly 
changing Risk Landscape; Cybersecurity Threats & Countermeasures and how they impact Cyber Insurance; and 
Ransomware Protection, Detection & Recovery.
 

Title: Storm Clouds on the Horizon – The Changing Risk Landscape

Date: Tuesday, October 04, 2022

Time: 10:00 AM Central Daylight Time

Duration: 1 hour

Summary

Managing cyber risks in today’s complex digital environment was challenging enough, but the increasing frequency and magnitude of attacks are straining the ability of organizations to keep systems and data secure. Individuals, organizations, and governments with malicious intent are increasing the complexity of their attacks to break down defenses already weakened by a myriad of impacts. These impacts include a reduction in available security staff; audit departments ceding much of their responsibility for auditing cyber defense technologies to the information security departments they are supposed to be auditing; security initiatives being deferred due to budget challenges; and increased phishing attacks preying on employee uncertainty and lack of security awareness. Security and control professionals are doing their best to cope under adverse circumstances. They realize, however, that hitting the pause button on security initiatives and technical security audits could lead to catastrophic security breaches jeopardizing critical business processes.

This webinar will provide an overview of where we are currently, the challenges on the horizon, and what organizations need to understand if they are to survive.

After participating in this webinar, you will better understand:

  • How attackers are increasing the complexity and ferocity of their attacks
  • What is happening today in many organizations that significantly magnifies the problem
  • New tools for assessing and reducing your cyber risk
  • Steps your organization needs to be taking right now

Regardless of your industry, this session will provide practical advice on how to keep an already challenging situation from becoming disastrous and alert you to actions your organization can take right now to withstand the coming storm and keep essential services running.

 

Title: Cybersecurity Threats, Countermeasures & How They Impact Cyber Insurance

Date: Tuesday, October 04, 2022

Time: 12:00 PM Central Daylight Time

Duration: 1 hour

Summary

Cybercriminals have a variety of Tactics, Techniques and Procedures (TTP) to gain unauthorized access to your systems and sensitive data. Jefferson Wells believes that it is not a matter of “if” but “when” you will suffer a breach. Organizations invest in cyber insurance to offset the financial and operational impact of a breach. You will learn about:

                                                                      

  • The types of threats that are most prevalent today and how cybercriminals are making money or causing industrial espionage from them (social engineering attacks, malware and cyber exploitation/ransomware, of Ransom DDoS (RDDoS) attacks, etc.)
  • Case studies for:
    • The most common cybersecurity attack vectors facing organizations today
    • Investments in preventive, detective, and recovery controls to counter the threats
    • Cybersecurity KPIs and metrics to demonstrate an optimized cybersecurity program
  • How cyber insurance companies evaluate the maturity of your cyber security program to determine rates
  • How your organization can reduce cybersecurity risks and get the best rates by making your company attractive (a lower risk) to insurance companies and their underwriters and less attractive to threat actors

Title: Ransomware: A Technical Dive into Protection, Detection, and Recovery

Date: Tuesday, October 04, 2022

Time: 2:00 PM Central Daylight Time

Duration: 1 hour

Summary

Ransomware has become a global business driven by a sea of potential victims and high profit margins. The business model of ransomware has expanded and evolved to the level of a commercial enterprise where "ransomware-as-a-service" (RaaS) is offered to anyone who wants to profit from the illicit activity. Potential threat actors with little to no technical knowledge can purchase off-the-shelf tools and quickly get into the "business" of extorting access to your data. These tools are offered on criminal marketplaces similar to eBay where malware developers compete to sell their software.

 

With the increased expansion of ransomware, it is important to know your exposure to an attack and identify the areas at risk within your organization. This presentation will take a dive into the technical details of successful ransomware attacks to help you determine your exposure while taking important steps to mitigate the risk. By participating in this webinar, you will learn about:

 

  • The business of ransomware and current methods used by gangs to extort organizations
  • How to determine where you are vulnerable to the methods used by current threat actors
  • What you can do after an initial compromise to prevent being a victim of ransomware
  • Proactive and reactive methods of recovery if you are a victim of ransomware

 

Regardless of your industry or job role, you'll come away with a new appreciation for the intricacies of ransomware and how you can better prepare.