Next-Generation Technologies & Secure Development , Threat Hunting , Threat Intelligence

Sophos Threat Report 2022

Chester Wisniewski, Principal Research Scientist, Sophos

Discover the major threat trends and tactics, techniques, and procedures (TTPs) used by attackers that will impact businesses in 2022. Join Chester as he shares the latest insights from SophosLabs and Sophos SecOps and provides practical guidance on how to mitigate these new threats.

See Also: Advanced Threat Prevention: Securing East-West Traffic


About the Author

Chester Wisniewski

Chester Wisniewski

Principal Research Scientist, Sophos

Chester Wisniewski is a principal research scientist at next-generation security leader Sophos. With more than 20 years of professional experience, his interest in security and privacy first peaked while learning to hack from bulletin board text files in the 1980s, and has since been a lifelong pursuit. Chester analyzes the massive amounts of attack data gathered by SophosLabs to distill and share relevant information in an effort to improve the industry's understanding of evolving threats, attacker behaviors and effective security defenses. He's helped organizations design enterprise-scale defense strategies, served as the primary technical lead on architecting Sophos' first email security appliance and consulted on security planning with some of the largest global brands. Based in Vancouver, Chester regularly speaks at industry events, including RSA Conference, Virus Bulletin, Security BSides (Vancouver, London, Wales, Perth, Austin, Detroit, Los Angeles, Boston and Calgary) and others. He's widely recognized as one of the industry's top security researchers and is regularly consulted by press, appearing on BBC News, ABC, NBC, Bloomberg, CNBC, CBC, NPR and more. When not busy fighting cybercrime, Chester spends his free time cooking, cycling, and mentoring new entrants to the security field through his volunteer work with InfoSec BC. Chester is available on Twitter (@chetwisniewski).




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.