Come meet us

Why is Ransomware so tough to avoid?

AUGUST 17th ( 10 AM PDT )

Join John Petersen, Chief Information Officer, Heffernan Insurance Brokers Trends and Saumitra Das, CTO and Cofounder of Blue Hexagon to learn about Ransomware, the single largest malware impacting a new organization every 14 seconds, and what security leaders can do to avoid falling victim to this cybercrime.

Ransomware has now evolved from “encrypting the data on the machine until the ransom is paid” to more nefarious tasks, including disruption-ware, exfiltrating sensitive corporate data, all in attempts to disrupt business and force payment. And, with remote work on the rise, exploitation of remote access and user devices increases corporate exposure to ransomware even more.

What you’ll learn from this webinar:

● Key concepts of ransomware

● Trends observed in hundreds of ransomware attacks as well as new trends on the intent of ransomware actors

● Critical priorities for creating a cyber-resilient organization

● What should be your Ransomware toolkit

● New AI technologies and tools to cut through the rapidly changing threat landscape

CloudSecNext Summit ( Jun 3-4, free registration link )

JUNE 4th ( 12:35 – 1:10 PM EDT ) – Shift-Left is Not Sufficient: Why Agentless Runtime AI Security is Necessary for the Cloud

Arun Raman, VP of Cloud Products, Blue Hexagon

There has been a huge hype about tools for dealing with cloud misconfigurations and cloud security posture. However, modern attacks on the cloud cannot be thwarted anymore by just shifting left. Attackers have moved to complex, multi-stage attacks that use supply chain infection, evasive beaconing, zero-day Linux malware, and ransoming cloud storage. These attacks only manifest at runtime, and defending against them requires multi-vector inspection of workload, network, storage, and control plane activity at runtime and in real-time. As importantly, the security architecture must provide full cloud coverage and must not introduce supply chain risk.

In this session, we will explore customer case studies on how an agentless runtime AI security approach helped defend against real-life modern cloud attacks.

We also demonstrate how such a solution can be deployed within minutes and easily maintained in complex multi-region, multi-VPC, multi-OS, multi-account, and multi-cloud architectures.

Webcast: How to Manage the Top 10 Cloud Security Risks ( View On-Demand )

In this session, we will go beyond the now pervasive and obvious example of open cloud storage buckets to discuss the top 10 modern cloud security risks with real-world examples.

Attendees will learn key techniques that they can deploy right away in their organization to:
– Mitigate cloud risks across multi-VPC, multi-OS, and multi-account deployment
– Detect unknown malicious code at the build, ship, and run stage
– Inspect and Analyze cloud network packets, API activity, and storage activity

Hear from Dr. Neil Daswani (former CISO of Lifelock and co-author of Big Breaches and Foundations of Security) and Dr. Saumitra Das (founder and inventor in AI security) about lessons learned from prior attacks and potential approaches to strengthen defenses against future attacks.

Ready to get started?
We’ll show you how fast we enable actionable visibility, real-time threat defense, and continuous compliance for your cloud.