May 20, 2020

Let’s look at the facts. Cybercriminals, who typically hide on the Dark Web are taking advantage of the COVID-19 pandemic infiltrating websites and infrastructure – whether on-premise or in the public cloud.

As reported, phishing attacks have increased 350% amid quarantine. With lockdowns in place, organizations have been forced to shift priorities and readjust, moving more business and transactions online – all with remote workforces. But are they equally prepared for the fallout over the next 6-9 months?

Join our security experts as we offer advice on how to build and revamp your business continuity plan to prepare for the ongoing and increasing amount of cybersecurity threats.

Key takeaways include:

  • Largest distributed workforce in history & the trickle-down effects we’re seeing in the cyber underground
  • Analysis on the increase in malware attacks and accidental losses for businesses
  • Recommendations on how companies can cost-effectively and easily readjust plans to protect their data and assets

Featured Speaker

Jacob Bieser, Security Operations Analyst, Armor

Jacob Bieser is a Senior Security Analyst and part of the Security Operations Center at Armor, working primarily with detections and incident response. He previously worked for Cyber Defense Labs responsible for complex network design and implementation, research and development, training in penetration testing, network security and forensics, and Cyber Summer Camp curriculum development. Jacob is a graduate of North Central Texas College with an Associates in Cyber Security, and is currently pursuing a Bachelors in Cyber Security and Information Assurance at Western Governors University. He is certified in IDS/IPS, Cryptography, and Organizational Data Security Fundamentals from Cybrary.

 

 

Michael Mayes, Sr. Writer & Researcher, Armor

Michael Mayes is a senior writer and researcher at Armor in Richardson, Texas. His career in technology communications includes work with the Human Genome Project, handheld software during the Palm and Pocket PC era, blockchain development, and cybersecurity. He began his research in black markets in 2013 during a PhD year in professional and technical writing at the University of Memphis where he wrote on the early days of Bitcoin and its defining proof of concept, the Silk Road.

 

Resource Center

More security resources at your fingertips.

Practical Content for Security, DevOps, & IT Professionals