About this webinar
As cyberattacks become more sophisticated and difficult to detect, it’s more important than ever for defenders to understand how they work in order to protect against them. In this session, you’ll see how attackers avoid your endpoints and how to detect signs of an attack, even without your EDR firing.
What you'll learn:
-
How to create a malicious Office macro
-
How attackers exploit remote access gateways
-
How a supply chain attack, like SolarWinds, works
-
What to look for as a sign of compromise

Jeremy Burtenshaw Security Consultant, Varonis
Jeremy Burtenshaw is a Security Consultant for Varonis, based in Sydney, Australia. Jeremy has been working for 19 years in the IT Industry, working across various aspects of both general IT solutions, and Cyber Security. For the past 4 years, he’s worked at Varonis focusing on helping customers solve Data Security problems, and delivering Projects.