Skip to content

Advantage and Cylance hosting NZHIT security breakfast

Advantage and Cylance present breakfast with NZHIT

Exploring the evolution of hacking tactics and ransomware in the last 12 months

 

Attackers come in two main forms – ones that want your Intellectual Property and ones that want your money. The tactics, techniques and procedures used by the two are starting to look the same and can be very sophisticated.

We will demonstrate a couple of techniques we’ve seen in recent Incident Response engagements, and how BlackBerry | Cylance can help protect and how you can better prepare for the worst.

Join us for a great breakfast and insightful demonstration

Places are limited, so please register now.

Wed., 11 March 2020

7:30 am – 9:00 am NZDT

 

About the speaker

Robert Collins – Technical Director for BlackBerry Cylance in APAC

Robert has 17 years’ experience in Cyber Security Industry. Prior to joining Cylance, he has worked with several Tier 1 security vendors.

He also had the opportunity of working within the end user market, heading up APAC information security and infrastructure for a large pharmaceutical company in Singapore

‍This session will be hosted by Robert Collins, Technical Director for BlackBerry Cylance in APAC and Robert will demonstrate a couple of techniques seen in recent Incident Response engagements and how you can better prepare for the worst.  You will come away with some tips on how to protect yourself and business.

 

https://www.healthit.org.nz/event/what-the-hackers-did-next-breakfast-with-blackberry-cylance

Facebook
Twitter
LinkedIn

Related Posts

We interviewed Brad Pearpoint about why Cyber Security is a core pillar of Advantage. He talks about the fact that security is a business-critical issue for businesses across all sectors and that every organisation, regardless of size, is facing growing pressures to protect data, ensure continuity of business and meet changing compliance requirements. He outlines how Advantage is responding to this issue with a client-first approach.
Strong passwords are the first step to protecting your online accounts—but not all passwords are created equal. In this blog, we reveal why the seemingly complex “PE#5GZ29PTZMSE” isn’t as secure as you think, why a passphrase like “Stop Hammer Time!” wins, and how to check if your own credentials have already been exposed in breaches. Plus, we explore the next critical step in cybersecurity: enabling multi-factor authentication (MFA).
Never in all my life did I imagine I had that headline in me, and yet, here we are. With that acknowledgement aside, let’s get straight into it. Slopsquatting.