Virtual Connect! Series

Trick or Treat: Defending Against Today's Spookiest Malware👻

Fri, October 30 | 12:00 pm EDT

View in your timezone

Mummy Spider. Gh0st Rat. Gothic Panda. 

If these threat actor names don't scare you, the malware they deploy should! 

Join us for a lesson in threat actor naming and a deep look into how the spookiest malware on the planet operates.  

Share your kiddo's drawing of these threat actors on LinkedIn, Facebook or Twitter with #spookymalware for a chance to be featured on the webinar and to win a treat!
All attendees will have a chance to win an Apple Watch 6, Bartesian and a Dyson Air Purifier. 
Reserve your spot!

Register Now

About this webinar...

This webinar will feature today’s spookiest malware. We’ll cover how different threat actors and malware strains get their names, how they evade detection and infiltrate your network, and how Varonis finds and alerts on early indications of compromise. 

What you'll learn...

  • The meaning behind threat actor names 
  • Common tactics, techniques, and procedures of ransomware gangs 
  • What to look out for with Emotet malware 
  • The importance of a data-centric view for detecting malware 



Snir Ben Shimol
Snir Ben Shimol Director of Cybersecurity, Varonis
Brian Vecci_circle
Brian Vecci Field CTO, Varonis
David Gibson Chief Marketing Officer, Varonis

All attendees have a chance to win some great prizes!

Dyson Air Purifier
Dyson Air Purifier
Apple Watch 6-2
Apple Watch 6
Bartesian cocktail machine
Bartesian Cocktail Machine

The moment Varonis detects signs of an attack, it immediately kicks the affected user off of the network and stops the attack. 

Chief Security Officer, U.S. County

Want to see Varonis in action?