Join us for lunch on August 5th to discuss the latest ransomware trends, why ransomware is so prevalent today, and learn defense strategies so that your organization is not the one debating "to pay or not to pay."
Next-gen ransomware has evolved to evade standard defenses and targeted attacks stand a high chance of success against underprepared environments. Let’s discuss a new approach to prevention, detection and response!
Register today and we'll send you a gift card to grab lunch on us!
Israel Barak, Chief Information Security Officer at Cybereason, is a cyber defense and warfare expert with a background developing cyber warfare infrastructure and proprietary technologies, including that of proprietary cryptographic solutions, research and analysis of security vulnerabilities. Israel is at the forefront of the company’s security innovation, research and analysis of advanced threats.
Mike is the Chief Information Security Officer at Abnormal Security, leading the company’s security, privacy and risk programs. He brings a wealth of strategic and operational experience in cybersecurity and privacy most recently as the CISO and Chief Privacy Officer at Alliance Data.
Defy provides unparalleled technical expertise in cybersecurity. More importantly, we deliver unparalleled customer experiences. That means that you’ll have a strategic partner who’s a true extension of your team and totally committed to your success. For our satisfied clients, that’s the Defy difference.
Abnormal Security provides the leading cloud-native email security platform that leverages behavioral data science to stop modern email attacks. Unlike legacy email security solutions, the Abnormal Security platform uses an innovative AI-based approach that deeply understands the people, relationships and business processes to stop the most sophisticated cyber-attacks.
Cybereason provides future-ready attack protection to unify security from the endpoint, to the enterprise, to everywhere. Our Defense Platform combines the industry’s top-rated detection and response (EDR and XDR), next-gen anti-virus (NGAV), and proactive threat hunting to deliver context-rich analysis of every element of a
malicious operation (MalopTM).