About this webinar
As cyberattacks become more sophisticated and difficult to detect, it’s more important than ever for defenders to understand how they work in order to protect against them. In this session, you’ll see how attackers avoid your endpoints and how to detect signs of an attack, even without your EDR firing.
What you'll learn:
-
How to create a malicious Office macro
-
How attackers exploit remote access gateways
-
How a supply chain attack, like SolarWinds, works
-
What to look for as a sign of compromise

Greg Baylis Enterprise Sales Engineer, Varonis UK Ltd
Greg is an Enterprise SE at Varonis, bringing over 20 years’ of IT & Security experience from both the Public and Private sectors. His focus is to provide innovative end-to-end business solutions which reduce cost, improve security and increase customer satisfaction.