Gain insight into how you can defend your
network against ransomware

12 October 2016

Register now
brought to you in partnership with ITWeb

Sophos has over 30 years of experience in creating an effective defence against ever-changing threats. One constant truth is that there is no silver bullet in security; it takes an intelligent balance of technology and research to ensure the best protection of your digital assets.

In this Webinar, Sophos will share what cyber criminals are doing to trick users and frustrate IT teams in an effort to spread their malicious payloads. Learn the tricks and prepare for battle in the ever-changing threat landscape.

What are the event’s aims?

Cyber crime is a billion-dollar industry and security experts expect a particularly large number of attacks on organisations – small, mid-size or enterprise level – in 2017. The aim is to make attendees understand how cyber criminals trick users, and how to be prepared for battle in the ever-changing threat landscape.


  • Learn about an effective defence against ever-changing threats.
  • Learn how to protect your digital .assets by an intelligent balance of technology and research.
  • Understand how cyber criminals spread their malicious payloads.
  • Explore the impact cyber attacks can have on your organisation.
  • Discover the tricks to combat cyber attacks.

Register for this free-to-attend event now!


Date: Wednesday, 24 May
Time: 15h00 (GMT+2)
Duration: 1 hour

Register for the Webinar


John Shier

John Shier, senior security advisor, Sophos
John Shier, senior security advisor, is a 10-year veteran of Sophos and has been working in the security industry for over 20 years. He is currently working in the office of the CTO doing research into all manner of threats and security issues. Shier is passionate about communicating and popularising security concepts and technologies to customers, partners, and the public at large in an entertaining, jargon-free and accessible way. He is a frequent presenter at Sophos events and security conferences around the globe, including RSA, Infosec, Cebit and Gitex. He has appeared on TV, radio, and in many online and print publications.


Individual and groups in the following roles:

  • Chief security information officer (CISO)
  • Chief security risk officer (CISRO)
  • Chief information officer (CIO)
  • Information security-related
  • Information risk-related
  • IT risk-related
  • Head of IT
  • Security architect
  • Risk analyst
  • IT audit-related
  • IT manager/director-related
  • Network analyst/engineer/admin
  • Systems engineer/admin/manager
  • Security analyst
  • Penetration tester


If you'd like to attend but can't make it – click here and we can send you the recording!