Menu
Stand

AA20

Company Profile

Sophos makes IT security simple with complete solutions that protect networks, servers and devices, wherever they are located. Today, more than 100 million users in 150 countries and a global network of channel partners rely on Sophos for trusted solutions to complex security challenges. Focused on innovation and backed by a global network of SophosLabs threat intelligence centers and industry-leading support, Sophos delivers solutions that are simple to deploy, maintain and manage, enabling organisations to focus on performance and growth. Sophos – Security made Simple.

Sophos Seminars

  • Social Engineering: Are You the Weakest Link? Greg Iddon  |   Sophos   |   Wed 5th Oct 11:00 - 11:30

    Cyber Threat Protection Theatre

    Wed 5th Oct 11:00 to 11:30

    Social Engineering: Are You the Weakest Link?

    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.
     
    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.
     
    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.

    Speaker

    Photo Speaker Name Profile
    Greg Iddon Greg Iddon View Profile
  • All Your Data are Belong to Us; How to Stay Protected Against Ransomware James Burchell  |   Sophos   |   Wed 5th Oct 12:20 - 12:50

    Cloud Security & IDAM Theatre

    Wed 5th Oct 12:20 to 12:50

    All Your Data are Belong to Us; How to Stay Protected Against Ransomware

    Ransomware has become one of the most widespread and damaging threats that Internet users face. Since the infamous Cryptolocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from home users and businesses alike.
     
    Large numbers of new infections continue to surface despite existing protective measures. How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • All Your Data are Belong to Us; How to Stay Protected Against Ransomware James Burchell  |   Sophos   |   Thu 6th Oct 11:00 - 11:30

    Future of Threat Intelligence Theatre

    Thu 6th Oct 11:00 to 11:30

    All Your Data are Belong to Us; How to Stay Protected Against Ransomware

    Ransomware has become one of the most widespread and damaging threats that Internet users face. Since the infamous Cryptolocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and exploit kits, extorting money from home users and businesses alike.
     
    Large numbers of new infections continue to surface despite existing protective measures. How are they so successful, what are the mechanisms that these infections use and how can we protect ourselves from the threats posed by ransomware?

    Speaker

    Photo Speaker Name Profile
    James Burchell James Burchell View Profile
  • Social Engineering: Are You the Weakest Link? Greg Iddon  |   Sophos   |   Thu 6th Oct 11:40 - 12:10

    Cyber Threat Protection Theatre

    Thu 6th Oct 11:40 to 12:10

    Social Engineering: Are You the Weakest Link?

    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.
     
    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.
     
    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.

    Speaker

    Photo Speaker Name Profile
    Greg Iddon Greg Iddon View Profile

Social Media

Twitter

Linkedin

IP EXPO | LinkedIn

The home of IP EXPO Event Series

Facebook