Webinars On-Demand | Intel471 Skip to content
Resources

Webinars On-Demand

Homepage Hero
Using Intel 471 Intelligence to Prevent Ransomware Attacks
Aug 15, 2023

Using Intel 471 Intelligence to Prevent Ransomware Attacks

This webinar looks into the cyber underground and shows how you can identify precursors for a ransomware attack to orient your defenses and stay one step ahead of your adversaries.

Busting a Myth: Overlap Between Nation State & Financially Motivated Cybercrime
Aug 15, 2023

Busting a Myth: Overlap Between Nation State & Financially Motivated Cybercrime

In this webinar, you'll discover the undeniable link between Nation-State and Financially Motivated cybercrime.

Ransomware Dramas Why Focusing On Ransomware Itself is Not Enough
Aug 14, 2023

Ransomware Dramas Why Focusing On Ransomware Itself is Not Enough

In this session, we look at the ecosystem that aids in the deployment of ransomware as well as the key actors and steps involved in a typical attack

Using A Data Driven Approach to Defend Against Cyber Threats
Aug 14, 2023

Using A Data Driven Approach to Defend Against Cyber Threats

Learn from CLEAR, Intel 471, and ThreatQuotient professionals, who share their tactical and strategic experience regarding how cybersecurity professionals have successfully addressed similar challenges

Ransomware: Attackers vs Defenders
Aug 14, 2023

Ransomware: Attackers vs Defenders

Join us as our presenters use Intel 471's knowledge of the underground and Unit 42's experience with ransomware incident response cases to reveal how threat actors find their victims, gain entry, and deploy ransomware.

Bottom Feeders: Initial Access Broker Activity Examined
Aug 14, 2023

Bottom Feeders: Initial Access Broker Activity Examined

Learn about initial access offerings in the cyber underground and gain insights into the activity patterns of the most prominent IABs.

Sidestepping a Cyber Car Crash in Matrix Time
Aug 14, 2023

Sidestepping a Cyber Car Crash in Matrix Time

Ransomware is like a slow-moving car crash. Incidents don't occur in an instant. The cyber underground is ripe with indicators that can predict an attack weeks or months before the event occurs.

7 Habits of Cybercriminals
Aug 14, 2023

7 Habits of Cybercriminals

This webinar presents the results of an analysis of more than 12 years of tracking and reporting on a variety of actors and groups in the cyber underground, which allowed us to identify seven specific habits of highly effective actors

Four Ways the Cyber Underground is like the Middle Ages
Aug 14, 2023

Four Ways the Cyber Underground is like the Middle Ages

In many ways, the cyber underground strongly resembles Medieval Italy or the Wild West. This webinar discusses how to increase your cyber protection by learning from history.

How a CTI Framework Catapults Your Cyber Security Program
Aug 14, 2023

How a CTI Framework Catapults Your Cyber Security Program

Join us for a discussion on how to build the right CTI Framework, fueled by General Intelligence Requirements (GIRs), to help you elevate your cyber defense and catapult your cybersecurity program to success.