About this webinar

As cyberattacks become more sophisticated and difficult to detect, it’s more important than ever for defenders to understand how they work in order to protect against them. In this session, you’ll see how attackers avoid your endpoints and how to detect signs of an attack, even without your EDR firing.

 

What you'll learn:

  • How to create a malicious Office macro 
  • How attackers exploit remote access gateways 
  • How a supply chain attack, like SolarWinds, works 
  • What to look for as a sign of compromise 
Jeremy Burtenshaw
Jeremy Burtenshaw Security Consultant, Varonis

Jeremy Burtenshaw is a Security Consultant for Varonis, based in Sydney, Australia. Jeremy has been working for 19 years in the IT Industry, working across various aspects of both general IT solutions, and Cyber Security. For the past 4 years, he’s worked at Varonis focusing on helping customers solve Data Security problems, and delivering Projects.

accent
REQUEST A DEMO

Explore our blog