{"id":3192,"date":"2021-05-27T09:38:55","date_gmt":"2021-05-27T09:38:55","guid":{"rendered":"https:\/\/partnernews.sophos.com\/en-us\/?p=3192"},"modified":"2021-07-12T08:45:34","modified_gmt":"2021-07-12T08:45:34","slug":"break-a-hackers-heart-week-june-21-24-2021","status":"publish","type":"post","link":"https:\/\/partnernews.sophos.com\/en-us\/2021\/05\/resources\/break-a-hackers-heart-week-june-21-24-2021\/","title":{"rendered":"Break a Hacker&#8217;s Heart Week: June 21-24, 2021"},"content":{"rendered":"<p>Join and promote our Break a Hacker&#8217;s Heart week, where industry experts will report on the latest headlines in cybersecurity and offer valuable insights to protect you and your customers against the latest threats to your organisation.<\/p>\n<p style=\"text-align: left;\"><a class=\"btn btn-blue\" href=\"https:\/\/register.gotowebinar.com\/register\/7460169217317306896\">Register Today<\/a><\/p>\n<p>During this exclusive series, you\u2019ll get a \u201cbehind the scenes\u201d look at a simulated targeted attack, hear first-hand stories from penetration testing specialists, and learn how to stop ransomware using next-generation cybersecurity protection. You will also have a chance to guide \u2013 and remediate \u2013 a cyberattack in a simulated threat hunt.<\/p>\n<h2><strong>Schedule Overview<\/strong><\/h2>\n<p>Join us live from June 21-24, 2021 between 11:00 &#8211;\u00a012:00 pm BST. Plus, with every webinar we are giving away a\u00a0<strong>$50 Sophos store voucher<\/strong>\u00a0to four lucky customers who attend.\u00a0This is one virtual event they do not want to miss!<\/p>\n<p><strong><em>Mon 21 June:<\/em><br \/>\n<\/strong><strong>Choose Your Own Hackventure<br \/>\n<\/strong>Help guide our intrepid duo, by going behind the scenes of a simulated targeted attack and witness typical steps carried out by attackers from their perspective of attack tools and approaches. Your choices on the day will influence the techniques and steps we go through, so pick wisely! Once we achieve our attack objectives, we\u2019ll switch sides to investigate malicious behaviour detections using Sophos EDR in a mock threat hunt.<br \/>\n<strong>Presenter:<\/strong> Jonathan Hope, Senior Sales Engineer and Leigh Sunter, Senior Sales Engineer<\/p>\n<p><strong><em>Tue 22 June:<\/em><br \/>\nLive Hacking with Dr Bright<br \/>\n<\/strong>Dr. Bright will share his experience as an infosec researcher and penetration tester. He\u2019ll reveal how adversaries attack, sharing the latest reconnaissance tactics, replicating the latest ransomware techniques to exploit corporate networks, giving insights into the role of early detection and response intelligence and will share ideas on your mitigation options and processes.<br \/>\n<strong>Presenter:<\/strong> Dr. Bright Gameli Mawudor, Founder Cyber Security Collective Africahackon<\/p>\n<p><strong><em>Wed 23 June:<\/em><br \/>\nHacking Tales \u2013 A Look Behind the Scenes of a Professional Hacking Company<br \/>\n<\/strong>Over the span of many years of hacking companies in order to find their vulnerabilities and strengthen their security, NSIDE Attack Logic\u2019s ethical hackers have many interesting stories to tell. Some of them entertaining, some frightening, some surprising \u2013 but all of them insightful. Rafael Fedler from NSIDE Attack Logic will present various anonymised accounts of their experiences while testing some of Europe\u2019s biggest organisations\u2019 security through offensive means. NSIDE will talk about some of their own hacks that they have performed as well as encounters with malicious actors while on the job. You will gain an insight into some of the tricks that are used to deceive users, bypass security mechanisms, and gain access to companies\u2019 most important data and systems. Additionally, you will discover what the risks are when neglecting basic security measures and how it could affect themselves or their companies.<br \/>\n<strong>Presenter:<\/strong> Rafael Fedler, CTO, NSIDE Logic Attack<\/p>\n<p><strong><em>Thu 24 June:<\/em><br \/>\nRansomware: What *really* happens if you pay the crooks?<br \/>\n<\/strong>If you get hit by a ransomware attack and you decide to pay the blackmail demand, what happens next? How well should you expect things to work out? And what if you don\u2019t pay? How do you handle the fallout then? We decided to find out by asking people who had already faced this unenviable dilemma. What they told us might surprise you&#8230;Don\u2019t let history repeat itself &#8211; learn how to prioritise your own ransomware defences.<br \/>\n<strong>Presenter:<\/strong> Paul Ducklin, Senior Technologist<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: left;\"><a class=\"btn btn-blue\" style=\"text-align: center;\" href=\"https:\/\/register.gotowebinar.com\/register\/7460169217317306896\">Register Today<\/a><\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Generate leads and increase your <\/strong><strong>sales by promoting the events<\/strong><\/h2>\n<p>Benefit from increased sales leads and revenue for your business. Start today by promoting this event using your Partner Referral ID and available co-branded marketing assets.<\/p>\n<p><a href=\"https:\/\/partners.sophos.com\/prm\/English\/c\/break-a-hackers-heart-2021-event\">Download Supporting Assets<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Venture into the dark world of hacking and find out how well equipped you are to protect against cyber attacks.<\/p>\n","protected":false},"author":11,"featured_media":3203,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3],"tags":[19,21],"coauthors":[64],"class_list":["post-3192","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-resources","tag-events","tag-threats-malware"],"jetpack_featured_media_url":"https:\/\/partnernews.sophos.com\/en-us\/wp-content\/uploads\/sites\/3\/2021\/05\/featured-image-Partner-Blog-Banner-1600x960px.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3192","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/comments?post=3192"}],"version-history":[{"count":10,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3192\/revisions"}],"predecessor-version":[{"id":3222,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/posts\/3192\/revisions\/3222"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media\/3203"}],"wp:attachment":[{"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/media?parent=3192"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/categories?post=3192"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/tags?post=3192"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/partnernews.sophos.com\/en-us\/wp-json\/wp\/v2\/coauthors?post=3192"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}