Skip to Content
View all events

Anatomy of an Attack

Published by O'Reilly Media, Inc.

Intermediate content levelIntermediate

Ransomware, social engineering, supply chain, AI, and quantum threats

In this course you’ll:

  • Examine ransomware attacks and the operations of prominent ransomware groups
  • Explore supply chain attacks and commonly used attack strategies
  • Look at social engineering attack techniques and tactics
  • Understand potential offensive and defensive uses of AI and quantum computing

Course description

Join cybersecurity expert Razi Rais for this series of hour-long sessions in which you’ll learn about the most common cyberattacks—ransomware, supply chain, and social engineering—and discuss the future role of artificial intelligence and quantum computing in cybersecurity.

Day 1: Ransomware

In this session, you’ll hear a history of ransomware, examine the lifespan and stages of a ransomware attack, get an overview of some well-known ransomware organizations and their strategies, and discuss the mechanisms for detecting, preventing, and recovering data from ransomware attacks.

Day 2: Social Engineering

On day 2, you’ll examine social engineering, or “the art of manipulating, influencing, or deceiving an individual in order to gain control of their digital assets or computer-based systems.” You’ll delve into social engineering attack vectors (pretexting, phishing, spear phishing, baiting, scareware, etc.), explore real-world successful social engineering cyberattacks, and discuss security best practices for preventing these attacks.

Day 3: Supply Chain

In this session, you’ll hear about the rise in supply chain attacks, discuss how this kind of attack works, and examine recent real-world attacks and the common vulnerabilities that lead to them. You’ll also get an overview of supply chain security frameworks published by standard bodies and discuss resources you can use to help mitigate these attacks.

Day 4: Artificial Intelligence and Quantum Computing

In the final session, you’ll look at threats posed by artificial intelligence and quantum computing, discuss the major challenges inherent in defending against these sophisticated, developing technologies, and gain a better understanding of the potential of these same technologies to fight the cyberattacks they enable.

NOTE: With today’s registration, you’ll be signed up for all four sessions. Although you can attend any of the sessions individually, we recommend participating in all four weeks.

What you’ll learn and how you can apply it

  • Prepare for and defend against ransomware attacks
  • Recognize and counter common social engineering attacks
  • Improve your defenses against supply chain attacks
  • Improve your cybersecurity posture by employing AI and quantum computing in cyberattack defense

This live event is for you because...

  • You’re a cybersecurity leader who wants to drill down on specific threats to your operations.
  • You’re an IT professional who wants to know more about cyberattacks and how to defend against them.

Prerequisites

Recommended follow-up:

Schedule

The time frames are only estimates and may vary according to how the class is progressing.

Day 1: Ransomware

Ransomware attack history, players, and kill chain (60 minutes)

  • Presentation: History and evolution of ransomware; ransomware attacks and how they work; understanding the ransomware kill chain; key ransomware players and common monetization techniques; preparing for and preventing ransomware attacks; what to do after the attack; understanding the role of cyber insurance; security practices and frameworks to defend against ransomware attacks; resources and next steps
  • Q&A

Day 2: Social Engineering

Social engineering attack techniques, examples, and prevention (60 minutes)

  • Presentation: History and evolution of social engineering attacks; understanding the concept of social engineering; types of social engineering attack vectors (pretexting, phishing, spear phishing, baiting, scareware, etc.); real world examples; preventing and mitigating attacks; reports and statistics about the importance and applications of social engineering in cyber warfare; resources and next steps
  • Q&A

Day 3: Supply Chain

Supply Chain Attack Techniques, Examples, and Prevention (60 minutes)

  • Presentation: History and evolution of supply chain attacks; understanding supply chain attacks and their phases; real-world examples; review of security guidance and frameworks published by NIST, DOD, and the UK National Cyber Security Centre; resources and next steps
  • Q&A

Day 4: Artificial Intelligence and Quantum Computing

AI and quantum computing cyberthreats (60 minutes)

  • Presentation: Origins and evolution of AI and quantum computing; cybersecurity threats posed by AI; role of AI in countering cyberattacks; understanding the impact of quantum computing on cybersecurity; the move toward “quantum-resistant” or “post-quantum” cryptography; NIST and other standards bodies' work on post-quantum standardization; AI and quantum computing in the cloud; how to better plan and prepare for these technologies in the future; resources and next steps
  • Q&A

Your Instructor

  • Razi Rais

    Razi Rais is a cybersecurity and AI leader at Microsoft, with over 20 years of experience building secure, resilient systems for Fortune 500 companies worldwide. He brings a globally informed perspective to enterprise-scale security, shaped by hands-on experience living and working in Singapore, UAE, France, and the United States. His background spans engineering, architecture, and product management, giving him a unique lens on the evolving intersection of AI and cybersecurity. He drives enterprise efforts to secure AI at scale and address emerging threats using frameworks like the NIST AI Risk Management Framework, OWASP Top 10 for LLMs, and MITRE ATLAS. Razi has coauthored several books, including Zero Trust Networks, second edition, and Azure Confidential Computing and Zero Trust and is a frequent speaker at conferences such as RSA and Identiverse. He serves on the GIAC advisory board, is a Microsoft Certified Trainer and delivers AI and cybersecurity training worldwide. Connect with him on LinkedIn to follow his latest work.

    linkedinXlinksearch

Skill covered

Security Operations