Q4 2022 Threat Landscape Virtual Briefing: Tech. and Manufacturing Targeted As Ransomware Peaks for 2022

Online Event

February 15 - 16, 2023 | (Online Event)

Register now
Webcast Threat Landscape Q4

Join Kroll’s cyber threat intelligence leaders in this webcast and explore key insights and trends from over 3,000 cyber incidents handled worldwide each year. This online briefing will discuss the overarching trends of 2022 and highlight some of the trends likely to have an impact in 2023, as well as diving into detail on the fourth quarter of the year. 

Join us to learn about the key security issues that emerged towards the end of 2022. We’ll also outline critical issues organizations should be aware of, including the sectors hit the hardest and the most active ransomware groups, such as Black Basta, AvosLocker, and the new threat actor, Royal.

For added convenience, we’re hosting this virtual briefing twice, with speakers including Keith Wojcieszek, Laurie Iacono and George Glass.

Attendees Will Learn More About

  • Key themes and patterns in the changing threat landscape and how these could impact organizations in 2023
  • Critical shifts in attacker behavior throughout 2022
  • The most common threat incident types of the second half of 2022 and how they have evolved
  • The most active ransomware groups and the tactics they employ

Sessions Available

This virtual briefing will run on both February 15 and 16. Please register for the time slot that suits you the best.

Region

Schedule

Registration

EMEA/Americas

February 15, 2023

11:00 a.m. – 11:45 a.m. (EST)

4.00 a.m. – 4.45 p.m. (GMT)

Register now

APAC

February 16, 2023

4:00 p.m. – 4:45 p.m. (HKT)

Register now


2023-02-15T00:00:00.0000000 2023-02-16T00:00:00.0000000 /-/media/kroll-images/events/webcast-threat-landscape-q4.png /en/insights/events/2023/webcast-threat-landscape-q4 event {E39587AD-8F0B-4FE2-865F-969BC5501096} {7EC13A8A-F86F-4AEB-8B10-1EE5D7371F2D} {7A48DD95-1A63-4784-842F-A2BE81EAFE13} {3A077BFC-C74A-40AF-A14C-13BCF6E3873E} {2F9D4938-E5F0-4F9C-9A20-C4A5DCF79130} {ECF5884A-6673-4CA5-B3B4-165229F1A36A} {A3E80394-4BDC-4E1D-8266-0653FE885E69} {809E3BA6-ABC7-4C3B-AB97-D7E5B9A66B24} {2DEEE4D2-8278-4C50-B3FF-1563BB257804} {70E25357-B690-49B8-948F-958DAD26DCD4} {6B18A490-2227-426A-A1D0-3836822E90EB}

Connect with us

Keith Wojcieszek
Keith Wojcieszek
Managing Director, Global Head of Threat Intelligence
Cyber Risk
Washington D.C.
Phone
Laurie Iacono
Laurie Iacono
Associate Managing Director
Cyber Risk
Secaucus
Phone

Stay Ahead with Kroll

Cyber Risk

Incident response, digital forensics, breach notification, managed detection services, penetration testing, cyber assessments and advisory.

Kroll Responder

Stop cyberattacks. Kroll Responder managed detection and response is fueled by seasoned IR experts and frontline threat intelligence to deliver unrivaled response.

Computer Forensics

Kroll's computer forensics experts ensure that no digital evidence is overlooked and assist at any stage of an investigation or litigation, regardless of the number or location of data sources.

24x7 Incident Response

Enlist experienced responders to handle the entire security incident lifecycle.

Incident Response Retainer

Kroll delivers more than a typical incident response retainer—secure a true cyber risk retainer with elite digital forensics and incident response capabilities and maximum flexibility for proactive and notification services.

Malware Analysis and Reverse Engineering

Kroll’s Malware Analysis and Reverse Engineering team draws from decades of private and public-sector experience, across all industries, to deliver actionable findings through in-depth technical analysis of benign and malicious code.

Ransomware Preparedness Assessment

Kroll’s ransomware preparedness assessment helps your organization avoid ransomware attacks by examining 14 crucial security areas and attack vectors.

Office 365 Security, Forensics and Incident Response

Digital forensic experts investigate hundreds of Office 365 incidents per year and help strengthen your security.

Cyber


Threat Actors use Google Ads to Deploy VIDAR Stealer

Dec 13, 2022

by Keith Wojcieszek Dave Truman, Stephen Green, George Glass

APAC State of Incident Response 2022


State of Incident Response: APAC

Oct 31, 2022

Cyber


Q3 2022 Threat Landscape: Insider Threat, The Trojan Horse of 2022

Nov 08, 2022

by Laurie IaconoKeith Wojcieszek George Glass

Managed Detection and Response


Managed Detection and Response (MDR) Buyer’s Guide

Oct 31, 2022

by Marc BrawnerPierson Clair Mark Nicholls