Share

Cybercrime Trends with Interpol

Cybercrime has skyrocketed during COVID-19 and while thankfully, the door is firmly closed on the year that was 2020, a strong cybersecurity posture has never been more important for organisations to maintain.

Join a panel of industry experts as they review a record year of cyberattacks, and discuss best practice advice to protect your organisation in this webinar on-demand. Hear from a veteran in international cybercrime enforcement, as he shares global trends contrasted with Australian insights. For instance did you know, Australia is over represented globally for business email compromise, with around 20% of all business email attacks targeting Australian companies.

With long careers in the fight against cybercrime our expert panel includes:

 

Key Questions Asked

Click the timestamps below to jump ahead to the following conversations:

  • 4:37 – COVID-19 presented a lot of opportunity for cybercriminals. What changes have you seen to the global state of cybersecurity in the last 12 months?
  • 8:15 – With your global view, is there anything that stands out for Australian cybersecurity? What type of cybercrime is most prevalent in Australia?
  • 10:50 – We’ve witnessed significant ransomware attacks against some pretty big Australian brands recently, but ransomware is often misunderstood and is actually the fourth or fifth stage of an attack…
  • 15:00 – Email continues to be the number one vector for Australian cyberattacks, do you have any best practice guidelines or advice on what organisations may be overlooking?
  • 19:10 – What are the global drivers fueling the rise in cybercrime?
  • 25:50 – How can private organisations support the effort of government authorities to identify and prosecute cybercrime?
  • 31:40 – What’s your point of view on preventative frameworks and guidelines such as the ASD’s Essential Eight?
  • 36:08 – Does Interpol work with the Australian government to consult on cybersecurity policy?
  • 38:45 – What type of strategies can organisations implement for education and awareness of cybercrime?
  • 43:45 – Cyberattacks happen in real time, how can industry share information better to collectively improve our defenses?
  • 49:35 – With reference to SolarWinds, today’s organisations rely on many third party providers, especially cloud services, do you have any recommendations for screening providers, contract protection etc?
  • 53:00 – Is there one key take away you would like to leave viewers today?

 

Free Trials

As a Cisco Master Security Partner, Data#3 is uniquely equipped to help you overcome evolving cybersecurity challenges to achieve your business objectives.

To learn how you can scale and protect your data and applications with Cisco security solutions, contact Data#3 to arrange a free trial for Cisco Duo, Cisco Umbrella, Meraki or the brand new Cisco Telemetry Broker.

Tags: ACSC Essential Eight, Cisco, Cisco Duo Security, Cisco Security, Cisco Umbrella, Cybercrime, Internet of Things (IoT), Ransomware, Security, Security Awareness Training

Featured

Related

SOC - Security operations center
Pull your socks up and get a SOC

Your Business Needs A Managed Security Operations Centre (SOC) Investing in high-quality socks can give you generous support and comfort.

To-SIEM-or-not-to-SIEM
To SIEM or Not To SIEM

What is SIEM? The sheer amount of information generated on your network is the stuff…

HP Elite Dragonfly
The HP Elite Dragonfly G2 Has Arrived: Secure, Sustainable, and Spectacular

The old adage that good things come in small packages was never truer than in HP’s latest device offering –…

Cisco-Duo-TechnoPro-Customer-Story-Card
Customer Story: Cisco Duo for TechnoPro

With IoT and digital transformation accelerating at speed to support a newly remote workforce, Japan’s TechnoPro Group…

How Cisco Secure Access by Duo simplifies multi-factor authentication

Multi-factor authentication (MFA) is the simplest, most effective way to make sure users really are who they say they are.

Essential-Eight-Maturity-Model-Patch-Applications
Essential Eight Maturity Model: Patch Applications

On July 12, 2021, the Australian Cyber Security Centre (ACSC) updated the Essential Eight Strategies to…

Webinar: Improve your schools’ Essential 8 maturity with Data#3 and Microsoft
Improve your school’s Essential 8 maturity with Data#3 and Microsoft

Many organisations struggle with their cybersecurity posture. Some have managed to arrive at a state of awareness, but very few…

Essential-Eight-Maturity-Model-Application-Control
Essential Eight Maturity Model: Application Control

As of July 12, 2021, the new Essential Eight maturity model became available and inspired me to write a new…