About this webinar
As cyberattacks become more sophisticated and difficult to detect, it’s more important than ever for defenders to understand how they work in order to protect against them. In this session, you’ll see how attackers avoid your endpoints and how to detect signs of an attack, even without your EDR firing.
What you'll learn:
- How to create a malicious Office macro
- How attackers exploit remote access gateways
- How a supply chain attack, like SolarWinds, works
- What to look for as a sign of compromise

David Gibson CMO, Varonis

Brian Vecci Field CTO, Varonis
