Sophos Webinar Series

 

 

Securing the Public Cloud: Seven Best Practices
Thursday 17th October 11am
Presenter: Richard Beckett
Product Focus: Public Cloud

Cybercriminals have been quick to exploit public cloud security gaps, resulting in major data breaches as well as CPU hijacking. Join our upcoming webinar to find out the seven security best practices to follow when using Amazon Web Services (AWS), Microsoft Azure, or Google Cloud Platform (GCP). We’ll cover:

  • How public cloud security differs from traditional on-premises protection
  • What you are (and are not) responsible for when using AWS, Azure, and GCP
  • Seven practical steps that will help you stay secure and compliant

We’ll also introduce Sophos Cloud Optix, an agentless, SaaS-based service that lets you see and secure your cloud-based instances with confidence.

Register Now

 

Solving The Impossible Puzzle of Cybersecurity
Tuesday 22nd October 11am

Presenter: Sally Adam
Product Focus:  Synchronized Security

Join this webinar to discover what 3,100 IT managers from 12 countries working on the frontline of cybersecurity have to say.

Based on the results of an independent survey, the session explores the impossible puzzle organizations face when it comes to stopping cyber threats, including:

  • The percentage of organizations hit by ransomware, phishing, malicious code, and software exploits in the last year
  • The most common ways attacks got into organizations
  • What IT managers said about cybersecurity recruitment and budgets

It also looks at the benefits of moving from point security products to a cybersecurity system to address these challenges.

 

Protect your Network from Real-World Threats
Thursday 24th October 11am

Presenter: Chris McCormack
Product Focus: XG Firewall

Learn how to protect your network with Sophos XG Firewall against the latest real-world threats like Emotet and other unknown threats. In addition, you get unparalleled visibility of applications running on your network that no other firewall can deliver.

REGISTER NOW

 

SD-WAN and XG Firewall – The AUS for unknown threats
Thursday 31st October 11am
Presenter: Andrew Dreier
Product Focus: SD-WAN and XG Firewall

SD-WAN (or Software Defined Networking in a Wide Area Network) is currently on everyone’s lips. But what exactly it is, is often not clear – the term is sometimes used quite differently.

Essentially, SD-WAN is mostly about achieving one or more of the following goals:

• Reduce the cost of connectivity
• Business Continuity
• Simple VPN connection of field offices
• Bandwidth management for critical applications

Learn all about the current topic SD-WAN in our webinar. You have the opportunity to ask questions live in the chat.

REGISTER NOW

 

Catch The Phish! How to avoid the phishing net
Tuesday 5th November 11am
Presenter: Richard Beckett
Product Focus: Phish Threat

Phishing emails are the most common cyberthreat affecting organisations today. As cyber crooks continue to improve and perfect their techniques, your users are more vulnerable to attacks than ever.
Join this webinar to learn more about the latest phishing techniques and get practical tips to help your organization avoid getting caught in the phishing net.
We’ll cover:

  • The most common type of attacks
  • Latest trends in phishing
  • How to minimize the risk of phishing for your organisation

REGISTER NOW

 

Ransomware is Back with a Vengeance
Tuesday 12th November 11am
Presenter: Seth Geftic

Ransomware is living its best life, making headlines week after week. Two in three organisations fell victim to a cyberattack in 2018 which proves traditional anti-malware is not enough.

Join this session to learn how intelligent endpoint detection and response is helping you stay safe during National Cybersecurity Awareness Month.

    • The impact of ransomware on organizations
    • Common ransomware attack methods
  • How artificial-intelligence and EDR protect against the widest range of threats
REGISTER NOW

 

Three Lies You’ve Heard About Threat Hunting (And One Thing That’s True)
Tuesday 19th November 11am
Presenter: Mat Gangwer

The term “Threat Hunting” doesn’t deserve to be placed on the security buzzword bingo board alongside terms like “artificial intelligence,” “real time,” and “next-gen,” to name a few. Unfortunately, its meaning has been co-opted and corrupted by marketers, making it difficult for those looking to add Threat Hunting capabilities to their security program to really understand what they should be looking for.

In this session, Mat Gangwer, Director of Managed Threat Response, breaks down the three biggest lies being told to sell Threat Hunting as a service. Featuring real-world examples of what really goes into a Threat Hunt, this session will set the record straight and prove that—despite the marketing hype—the concepts, process, and strategies associated with Threat Hunting are critical to any successful security program.

REGISTER NOW

 

Protecting Your Network from Encrypted Threats
Tuesday 26th November 11am
Presenter: Chris McCormick

Encryption of network traffic is rapidly approaching 100% creating an enormous blind spot in your network security that hackers and malware authors are already starting to exploit. And with most Firewall solutions unable to adequately handle this challenge, many organizations are left powerless to do anything about it -leaving them vulnerable to attack.

In this session, we will look at the challenges with ever increasing network traffic encryption and what you should be looking for in your next Firewall to protect your network from this growing threat vector.

REGISTER NOW

 

7 Uncomfortable Truths of Endpoint Security
Tuesday 3rd December 11am
Presenter: Sally Adam
Product Focus: Synchronized Security
Join this webinar to discover what 3,100 IT managers had to say when it comes to endpoint security.
We’ll share the challenges they face, what keeps them up at night, and their experiences with endpoint detection and response (EDR) technologies. Highlights include:
  • Where most cyberattacks are discovered
  • Why IT teams struggle to plug their security gaps
  • How much time is lost each month investigating non-issues

The Seven Uncomfortable Truths of Endpoint Security reveals deep insights into today’s cybersecurity challenges. Register to attend and see how your organization stacks up.

REGISTER NOW

 

Orchestrating the Chaos with Sophos Central
Thursday 10th December 11am
Presenter: Greg Iddon
Product Focus: Sophos Central

How can you stay safe from attack when your attack surface has never been larger? Countless devices, numerous different operating systems, and data all over the place. It’s no wonder far too many organisations head the headlines due to failings in their security.

Sophos Central, the industry’s pioneering cybersecurity platform, unifies all the products and technologies you need to protect yourself from modern, targeted attacks into a single, coherent, astonishingly easy-to-use, cloud-based system. No more console hopping, no more blind spots, no more breaches. Endpoint, Server, Email, Web, Firewall, Wireless, Cloud Infrastructure, User Awareness Training, Attack Simulations, and more… All in one place, designed to be used together. No huge teams required.

Come and see the power of the Sophos Central platform and how it is redefining what it is do security and be secure.

REGISTER NOW