Skip to content

Advantage and Cylance hosting NZHIT security breakfast

Advantage and Cylance present breakfast with NZHIT

Exploring the evolution of hacking tactics and ransomware in the last 12 months

 

Attackers come in two main forms – ones that want your Intellectual Property and ones that want your money. The tactics, techniques and procedures used by the two are starting to look the same and can be very sophisticated.

We will demonstrate a couple of techniques we’ve seen in recent Incident Response engagements, and how BlackBerry | Cylance can help protect and how you can better prepare for the worst.

Join us for a great breakfast and insightful demonstration

Places are limited, so please register now.

Wed., 11 March 2020

7:30 am – 9:00 am NZDT

 

About the speaker

Robert Collins – Technical Director for BlackBerry Cylance in APAC

Robert has 17 years’ experience in Cyber Security Industry. Prior to joining Cylance, he has worked with several Tier 1 security vendors.

He also had the opportunity of working within the end user market, heading up APAC information security and infrastructure for a large pharmaceutical company in Singapore

‍This session will be hosted by Robert Collins, Technical Director for BlackBerry Cylance in APAC and Robert will demonstrate a couple of techniques seen in recent Incident Response engagements and how you can better prepare for the worst.  You will come away with some tips on how to protect yourself and business.

 

https://www.healthit.org.nz/event/what-the-hackers-did-next-breakfast-with-blackberry-cylance

Facebook
Twitter
LinkedIn

Related Posts

Personal data protection is more important than ever in this digital world. The dark web is a secret part of the internet that is very dangerous because it is often used for illegal things like selling personal information.
Every morning, I stand before my coffee machine, a humble supplicant seeking caffeine. Sound familiar? Probably because you find yourself in much the same position (though in your home, not mine). But the coffee machine is wiser than it appears: It doesn’t care that I’ve spent years navigating the wilds of cybersecurity while exploring select espressos from Brazil and beyond.
A throwaway joke got me thinking recently. Any system that appears secure might just be that way because it hasn’t yet been compromised. And as we say in this game, there’s only two types of companies out there, those that have been breached and those that don’t know they’ve been breached.