To view this email as a web page, click here

March 19th at 2pm ET / 11am PT

Attendees of this live webcast may be eligible for CPE credit.
 

Picus Security recently analyzed over 600,000 malware samples to identify the ten most common techniques leveraged by attackers.

Learn about the key findings of the research, including the rise of evasive ‘Hunter-killer’ malware that systematically targets and impairs security controls to achieve its objectives.

Save your seat now to discover:

  • The ten most widely used MITRE ATT&CK techniques
  • Why and how adversary behaviors are evolving
  • Ways to validate your readiness against sophisticated attacks
 
 

Can’t attend live? Sign up anyway and we’ll send you a link to the webcast recording when it becomes available.

 
 
SC Media webcasts offer programs with leading IT security vendors moderated by SC Media editorial staff.

Attendees may be eligible to receive 1 CPE credit for each one-hour webcast they attend, subject to their respective industry association’s approval.

Unsubscribe here
View Privacy Policy and Terms of Service
You are subscribed as: [email protected]
© 2024 CyberRisk Alliance | 400 Madison Avenue, Suite 6C New York, NY 10017
..