Malware in 2021 was more sophisticated and evasive than ever before. We saw the growth of ransomware-as-a-service, the emergence of fake software updates, and the resurfacing of Emotet.
What will 2022 bring? To protect your organization in the new year, it’s good to have some idea of what lurks around the corner — as well as security best practices that will keep you covered against the most elusive types of malware.
No one has a crystal ball, but security experts Aviv Grafi, CTO and Co-Founder of Votiro and Matthew Warner, CTO and Co-Founder of Blumira, will share predictions of the malware landscape in 2022 based on real data and on-the-ground experiences.
- How evasion techniques might evolve in 2022
- Best practices to keep you ahead of the malware curve — no matter what your team size or budget
- Is Emotet malware here to stay in 2022?
This interactive, conversational-style session encourages questions and engagement with viewers – so sign up today for access to our security experts.
Matthew Warner, CTO and Co-Founder, Blumira
Matt is CTO and Co-Founder of Blumira, a leading cybersecurity provider of automated threat detection and response technology. At Blumira, he leads the security and engineering efforts to provide actionable insights into cybersecurity risks at scale. Matt has over 10 years of experience in IT and development, focusing on business strategy, development, compliance, threat detection and penetration testing. Previously, he was Director of Security Services, Development & Security at NetWorks Group, responsible for defensive information security and services.
Aviv Grafi, CTO and Co-Founder, Votiro
Aviv Grafi is CTO & Founder of Votiro, an award-winning cybersecurity company specializing in sanitizing files of all kinds through Votiro’s Secure File Gateway solutions. Prior to co-founding Votiro, Aviv served in an elite intelligence unit of the IDF, nurturing his passion for finding simple solutions to complex security issues. Aviv’s areas of expertise span the cyber product lifecycle—from strategy and development, through go-to market—along with network security, IDS/IPS/firewall internals, defensive programming, enterprise security penetration testing, vulnerability research, and virtualization.