icon-half-octagon
CPE Webinar Replay

Hacking for Cash: How Attackers Monetize Vulnerabilities (And How to Stop Them)

On-Demand

Explore three in-depth case studies from the front lines revealing how hackers monetize your sensitive financial information while remaining undetected for months.
Replay

Watch Now

About this webinar

Varonis Field CTO Brian Vecci explains how these widely publicized attacks (Qbot, Norman) were discovered, contained, and remediated, as well as how to prevent future threats based on their behavior.

During this new CPE webinar, we will discuss:
  • How Varonis exposed the new global cyber strain of Qbot financial malware 
  • Crypto behavioral analysis of Norman and its accompanying PHP Shell 
  • How attackers spoofed MFA and rerouted a hospital’s payroll accounts 
  • Why any organization can be hacked, regardless of the maturity of their security program 
  • Steps you can take to identify vulnerabilities and harden your network against attack
Headshot_BrianVecci_202007
Brian Vecci Field CTO, Varonis

Brian Vecci is a 19-year veteran of information technology and data security, including holding a CISSP certification. He has served in applications development, system architecture, project management, and business analyst roles in financial services, legal technology, and data security software organizations. Brian currently serves as a Technical Evangelist for Varonis Systems and works passionately to help organizations of all sizes get the most value from their data with the least amount of risk. 

“The level of governance and insight provided by Varonis empowered our team to detect and respond to abnormalities as well as user activity and misconfigurations.”

Al Faella, CTO, Prospect Capital Management

Want to see Varonis in action?

REQUEST A DEMO