Share

Cybercrime Trends with Interpol

Cybercrime has skyrocketed during COVID-19 and while thankfully, the door is firmly closed on the year that was 2020, a strong cybersecurity posture has never been more important for organisations to maintain.

Join a panel of industry experts as they review a record year of cyberattacks, and discuss best practice advice to protect your organisation in this webinar on-demand. Hear from a veteran in international cybercrime enforcement, as he shares global trends contrasted with Australian insights. For instance did you know, Australia is over represented globally for business email compromise, with around 20% of all business email attacks targeting Australian companies.

With long careers in the fight against cybercrime our expert panel includes:

 

Key Questions Asked

Click the timestamps below to jump ahead to the following conversations:

  • 4:37 – COVID-19 presented a lot of opportunity for cybercriminals. What changes have you seen to the global state of cybersecurity in the last 12 months?
  • 8:15 – With your global view, is there anything that stands out for Australian cybersecurity? What type of cybercrime is most prevalent in Australia?
  • 10:50 – We’ve witnessed significant ransomware attacks against some pretty big Australian brands recently, but ransomware is often misunderstood and is actually the fourth or fifth stage of an attack…
  • 15:00 – Email continues to be the number one vector for Australian cyberattacks, do you have any best practice guidelines or advice on what organisations may be overlooking?
  • 19:10 – What are the global drivers fueling the rise in cybercrime?
  • 25:50 – How can private organisations support the effort of government authorities to identify and prosecute cybercrime?
  • 31:40 – What’s your point of view on preventative frameworks and guidelines such as the ASD’s Essential Eight?
  • 36:08 – Does Interpol work with the Australian government to consult on cybersecurity policy?
  • 38:45 – What type of strategies can organisations implement for education and awareness of cybercrime?
  • 43:45 – Cyberattacks happen in real time, how can industry share information better to collectively improve our defenses?
  • 49:35 – With reference to SolarWinds, today’s organisations rely on many third party providers, especially cloud services, do you have any recommendations for screening providers, contract protection etc?
  • 53:00 – Is there one key take away you would like to leave viewers today?

 

Free Trials

As a Cisco Master Security Partner, Data#3 is uniquely equipped to help you overcome evolving cybersecurity challenges to achieve your business objectives.

To learn how you can scale and protect your data and applications with Cisco security solutions, contact Data#3 to arrange a free trial for Cisco Duo, Cisco Umbrella, Meraki or the brand new Cisco Telemetry Broker.

Tags: ASD Essential Eight, Cisco, Cisco Duo Security, Cisco Security, Cisco Umbrella, Cybercrime, Internet of Things (IoT), Ransomware, Security, Security Awareness Training

Featured

Subscribe to our blog

Related

Q&A St Vincents Health
A new Era in Data Management:
Q&A with Cohesity and St Vincent’s Health Australia

Legacy data management environments are complex and siloed, leading to unnecessary expense and overheads that today’s IT teams simply don’t…

Data#3 recognised as a global finalist of 2021 Microsoft OEM Device Distributor/Reseller Partner of the Year

July 09, 2021; Brisbane, Australia: Leading Australian technology services and solutions provider, Data#3, today announced it has been named a…

Blog | Cohesity Use Cases
The modern use cases driving an evolution in data protection and recovery

In our previous post, we looked at what’s driving the increased interest in Cohesity and introduced a few use…

Customer Story: A Cisco Firepower Case Study

Cisco Firepower Strengthens Organisational Cybersecurity Defences Objective As a large organisation that places a high priority on IT security to…

Why Cohesity?
What’s driving the increased interest in Cohesity?

There has been a quiet evolution taking place in an area that often gets overlooked when it comes to technology…

Video: Cyber Maturity in Education Part 2
Cyber Maturity in Education Part 2

Practical steps to improve your School’s Security Posture Speaker Bio Logan Daley – Enterprise Security Architect, Australia & Pacific Islands,…

Video: Cyber Maturity in Education Part 1
Cyber Maturity in Education Part 1

Practical steps to improve your School’s Security Posture Speaker Bio Afzal Shariff – Director ICT Services, A.B. Paterson College Afzal…

Customer Story: IMDEX

IMDEX Transforms Mining Operations by Digging Deep Into Data Key Challenges IMDEX ’s teams needed a tool to manage exorbitant…