Cryptomining infections are growing exponentially this year. Bad guys are hijacking your network processing power and are stealing your workstation and server resources. They are using various families of malware trying to stay under your radar.

Trying to maximize their criminal profits, they now infiltrate your network and use malicious code to determine the most lucrative attack—cryptomining or ransomware—making these attacks more dangerous than ever. To add insult to injury, they often leave whole libraries of hacking tools and backdoors behind.

Join our experts and learn more about the combined ransomware and cryptomining threat, along with real world examples of how criminals attack your users and network through innovative and devious tactics.

You’ll learn about:
     • Cryptomining and what the real danger is to you
     • The combined cryptomining/ransomware threat
     • How this type of malware spreads
     • What you can do to protect your network

Be sure to include your questions for the presenters when you register for the live or on-demand version of the broadcast. CPE credits are available.

Earn 2 CPE credits

Generously Supported By:

supported by logo
speaker photo
Justin Daniels
Attorney, Baker Donelson

Justin Daniels is a thought leader in cybersecurity who believes cybersecurity must be treated by the c-suite as a strategic enterprise business risk. He provides strategic advice to companies to help them understand cyber risk and create a comprehensive approach to address it. He specifically advises on cyber business and legal issues in mergers and acquisitions, investment capital transactions and related due diligence matters, information security plans, incident response plans, vendor and customer contracts and cyber insurance. Justin is an attorney with Baker Donelson, where he specializes in M&A and other business transactions.

Justin is a leader in Georgia's cybersecurity industry. In 2017, he founded and led the inaugural Atlanta Cyber Week ( where multiple organizations held 11 events that attracted more than 1,000 attendees from five countries. Atlanta Cyber Week created business opportunities between growth cyber companies and Atlanta's middle market and Fortune 1,000 customer base while also burnishing the reputation of Atlanta's regional cybersecurity ecosystem. At the end of Atlanta Cyber Week 2017, he gave a Ted Talk entitled "Why You Hold the Key to Cybersecurity." He launched the podcast CyberXchange in April 2018 where he exchanges views on cybersecurity with industry leaders and influencers. He speaks extensively about the topic of cybersecurity and has done so in the United States, the UK and Israel.

speaker photo
Col. Cedric Leighton
CNN Military Analyst, USAF (ret.) and CEO, Cedric Leighton Associates

Founder of a strategic risk consultancy after serving 26 years in the US Air Force, Cedric Leighton oversaw numerous critical intelligence missions throughout his career. He served at US Special Operations Command, the Joint Staff and the National Security Agency, where he helped train the nation's cyber warriors. A Middle East combat veteran, he is the recipient of numerous military awards, including the Defense Superior Service Medal and the Bronze Star.

Currently, Cedric advises multinational businesses on cyber attacks and the management of complex global strategies to reduce risk and unpredictability.

speaker photo
Erich Kron
Security Awareness Advocate, KnowBe4
Erich Kron is a veteran information security professional with over 18 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP, CCENT and ITIL v3 certifications, among others. He has managed the technical integration and functional testing of multi-million-dollar enterprise level technology projects within the Department of Defense, as well as large military security programs. Erich has worked with information security professionals around the world to provide the tools, training and educational opportunities to succeed in the InfoSec industry.