{"id":13772,"date":"2021-05-17T14:54:20","date_gmt":"2021-05-17T14:54:20","guid":{"rendered":"https:\/\/www.bbinsurance.com\/?post_type=insight&amp;p=9913"},"modified":"2021-05-17T14:54:20","modified_gmt":"2021-05-17T14:54:20","slug":"cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines","status":"publish","type":"insight","link":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/","title":{"rendered":"Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines"},"content":{"rendered":"<p><strong>Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines<\/strong><\/p>\n<p><strong>Date:<\/strong> Wednesday, June 9<\/p>\n<p><strong>Time:<\/strong> 2 \u2013 3 PM ET<\/p>\n<p>As the number and costs surrounding cyber-attacks continue to grow, our Cyber team has put together a panel of specialists to discuss extortion attacks and insights around preventing and responding to them.<\/p>\n<p>We have partnered with Sygnia to review a high-impact cyber extortion attack against a U.S.-based corporate entity. They will offer insights by providing:<\/p>\n<ul>\n<li>Attacker and responder perspectives<\/li>\n<li>Examples of real-life events<\/li>\n<li>Experiences from the frontlines<\/li>\n<li>Latest techniques threat actors are using against organizations<\/li>\n<li>An example of this type of attack within the network<\/li>\n<\/ul>\n<p>Our panel of specialists from Brown &amp; Brown, Sygnia, and Hogan Lovells will share recommendations on adapting resilience and critical points to consider when responding to these cyber-attacks. They will also provide knowledge from an incident response, legal, and insurance perspective.<\/p>\n<p><a href=\"https:\/\/register.gotowebinar.com\/register\/7749790475302583822\">Reserve My Spot<\/a> or <a href=\"https:\/\/www.bbinsurance.com\/wp-content\/uploads\/2021\/05\/Brown-Brown-Insurance-Cyber-Webinar.pdf\">download the PDF<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the number and costs surrounding cyber-attacks continue to grow, our Cyber team has put together a panel of specialists to discuss extortion attacks and insights around preventing and responding to them.<\/p>\n","protected":false},"author":13,"featured_media":18695,"template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"insight_category":[127,132],"class_list":["post-13772","insight","type-insight","status-publish","has-post-thumbnail","hentry","insight_category-company-news","insight_category-in-the-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines - Brown &amp; Brown<\/title>\n<meta name=\"description\" content=\"As the number and costs surrounding cyber-attacks continue to grow, our Cyber team has put together a panel of specialists to discuss extortion attacks and insights around preventing and responding to them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines\" \/>\n<meta property=\"og:description\" content=\"As the number and costs surrounding cyber-attacks continue to grow, our Cyber team has put together a panel of specialists to discuss extortion attacks and insights around preventing and responding to them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/\" \/>\n<meta property=\"og:site_name\" content=\"Brown &amp; Brown\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/05\/cyber-may-2021.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1425\" \/>\n\t<meta property=\"og:image:height\" content=\"836\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/\",\"url\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/\",\"name\":\"Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines - Brown &amp; Brown\",\"isPartOf\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/05\/cyber-may-2021.jpg\",\"datePublished\":\"2021-05-17T14:54:20+00:00\",\"description\":\"As the number and costs surrounding cyber-attacks continue to grow, our Cyber team has put together a panel of specialists to discuss extortion attacks and insights around preventing and responding to them.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#breadcrumb\"},\"inLanguage\":\"us\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"us\",\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#primaryimage\",\"url\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/05\/cyber-may-2021.jpg\",\"contentUrl\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/05\/cyber-may-2021.jpg\",\"width\":1425,\"height\":836,\"caption\":\"hacker working on laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bbrown.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\/\/www.bbrown.com\/us\/news-events\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bbrown.com\/us\/#website\",\"url\":\"https:\/\/www.bbrown.com\/us\/\",\"name\":\"Brown &amp; Brown\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bbrown.com\/us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"us\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bbrown.com\/us\/#organization\",\"name\":\"Brown &amp; Brown\",\"url\":\"https:\/\/www.bbrown.com\/us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"us\",\"@id\":\"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png\",\"contentUrl\":\"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png\",\"width\":1000,\"height\":136,\"caption\":\"Brown &amp; Brown\"},\"image\":{\"@id\":\"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines - Brown &amp; Brown","description":"As the number and costs surrounding cyber-attacks continue to grow, our Cyber team has put together a panel of specialists to discuss extortion attacks and insights around preventing and responding to them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines","og_description":"As the number and costs surrounding cyber-attacks continue to grow, our Cyber team has put together a panel of specialists to discuss extortion attacks and insights around preventing and responding to them.","og_url":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/","og_site_name":"Brown &amp; Brown","og_image":[{"width":1425,"height":836,"url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/05\/cyber-may-2021.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/","url":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/","name":"Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines - Brown &amp; Brown","isPartOf":{"@id":"https:\/\/www.bbrown.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#primaryimage"},"image":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/05\/cyber-may-2021.jpg","datePublished":"2021-05-17T14:54:20+00:00","description":"As the number and costs surrounding cyber-attacks continue to grow, our Cyber team has put together a panel of specialists to discuss extortion attacks and insights around preventing and responding to them.","breadcrumb":{"@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#breadcrumb"},"inLanguage":"us","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/"]}]},{"@type":"ImageObject","inLanguage":"us","@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#primaryimage","url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/05\/cyber-may-2021.jpg","contentUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/05\/cyber-may-2021.jpg","width":1425,"height":836,"caption":"hacker working on laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bbrown.com\/us\/insight\/cyber-webinar-cyber-extortion-attacks-insights-from-the-frontlines\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bbrown.com\/us\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/www.bbrown.com\/us\/news-events\/"},{"@type":"ListItem","position":3,"name":"Cyber Webinar: Cyber Extortion Attacks: Insights from the Frontlines"}]},{"@type":"WebSite","@id":"https:\/\/www.bbrown.com\/us\/#website","url":"https:\/\/www.bbrown.com\/us\/","name":"Brown &amp; Brown","description":"","publisher":{"@id":"https:\/\/www.bbrown.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bbrown.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"us"},{"@type":"Organization","@id":"https:\/\/www.bbrown.com\/us\/#organization","name":"Brown &amp; Brown","url":"https:\/\/www.bbrown.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"us","@id":"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","contentUrl":"https:\/\/www.bbrown.com\/wp-content\/uploads\/2021\/12\/cropped-BBRetail002-RGBrevs.png","width":1000,"height":136,"caption":"Brown &amp; Brown"},"image":{"@id":"https:\/\/www.bbrown.com\/us\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight\/13772","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight"}],"about":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/types\/insight"}],"author":[{"embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/users\/13"}],"version-history":[{"count":0,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight\/13772\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/media\/18695"}],"wp:attachment":[{"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/media?parent=13772"}],"wp:term":[{"taxonomy":"insight_category","embeddable":true,"href":"https:\/\/www.bbrown.com\/us\/wp-json\/wp\/v2\/insight_category?post=13772"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}