Conscia Webinar On Demand:

Cyberwarfare and its impact on your business

Destructive malware’s capabilities against your organization – what threatens your company right now?

Capabilities developed for Cyberwarfare will be used against businesses as well, not just in war. This webinar on demand sheds light on how organizations can use threat intelligence acquired during cyberwarfare to improve their cyber-defenses.

As we see, wars are fought both on soils and in the cyber world. Military warfare is much more brutal and cruel, however, it is aided by cyberwarfare with espionage and destructive capabilities of malware that hinder critical infrastructure of their targets.

But what happens once the war is over? Do the countries just throw their guns and rifles into the trash bins? Of course not. And neither do they discard of the malware developed during cyberwarfare. These get a new purpose, and for malware, this usually means that their target switches to businesses.

Watch the webinar on demand to find out more about cyberwarfare tactics and tools used in the current Russia-Ukraine war. We will explain how these tools can and will be used against businesses. You will also learn how organizations can use threat intelligence acquired during cyberwarfare to improve their cyber-defenses.

AGENDA

  • Malware types and their intent in cyberwarfare
  • Repurposing malware: Who’s next?
  • Implementations of countermeasures based on Threat Intelligence

This webinar on demand is in English

Speakers

Jan Bervar

Jan Bervar has spent 25 years in cybersecurity and is currently busy with securing the leading edge: advanced detection and response, cloud security, security automation, and security in the era of the Internet of Things (IoT). Using a “yes” security approach whenever possible, Jan provides organizations with an optimal, controlled-risk approach that enables them to try out new ideas, all while deploying common sense and robust countermeasures.

David Kasabji

David Kasabji is a Threat Intelligence Engineer at the Conscia Group. His main responsibility is to deliver relevant Threat Intel in different formats to specific audiences, ranging from Conscia’s own cyberdefense, all the way to the public media platforms. His work includes analyzing and engineering Threat Intel from various data sources, reverse engineering obtained malware samples, crafting TTPs based on acquired information, and publishing R&D content.