About this webinar

As cyberattacks become more sophisticated and difficult to detect, it’s more important than ever for defenders to understand how they work in order to protect against them. In this session, you’ll see how attackers avoid your endpoints and how to detect signs of an attack, even without your EDR firing.

What you'll learn:

  • How to create a malicious Office macro 
  • How attackers exploit remote access gateways 
  • How a supply chain attack, like SolarWinds, works 
  • What to look for as a sign of compromise 
Headshot_DavidGibson_202007
David Gibson CMO, Varonis
Headshot_BrianVecci_202007
Brian Vecci Field CTO, Varonis
Snir Ben Shimol
Snir Ben Shimol Director of Cybersecurity, Varonis
accent
REQUEST A DEMO

Explore our blog