Live Webinar Series
Staying Ahead of Ransomware with Real-Time Identity Protection
Valid accounts have become the #1 cause of cyber attacks, with a 71% increase in their abuse by cybercriminals over the past year. Unlike publicly exposed and quickly mitigated leaked credentials, compromised accounts involve stealthy, unauthorized access that evades detection. Frequently stolen by Infostealers, these credentials have become the weapon of choice for attackers, bypassing advanced Firewalls, EDRs, and other security controls.
Breaches involving compromised credentials take an average of 292 days to detect and contain—longer than any other attack vector—and cost organizations around $4.81 million per incident.




Webinars
-
Webinar #1
The Cybercrime Economy: Infostealers & Initial Access Brokers
Oct 1, 2024 | 09:00 AM EST
Host: Raveed Laeb
Join Raveed Laeb, VP Product at Kela, to learn about the evolution of Infostealers, why they are important, their distribution in underground markets, subscription services and ULPs, and their place in the cybercrime ecosystem.
More infoThe Cybercrime Economy: Infostealers & Initial Access BrokersFull DescriptionOct 1, 2024 | 09:00 AM EST
Key Topics:
- Evolution and significance of Infostealers in the cybercrime ecosystem
- Distribution of Infostealers in underground markets
- Subscription services and ULPs (Underground Leaking Platforms)
- The role of Infostealers in facilitating various cybercriminal activities
-
Webinar #2
Compromised accounts: The #1 Cause of Cyber Breaches
Oct 15, 2024 | 09:00 AM EST
Host: Victoria Kivilevich
In this webinar hosted by Victoria Kivilevich, Director of Threat Research at KELA, we explore how valid accounts are becoming a primary vector for cyber attacks and the role of infostealers in exposing corporate resources. We’ll review real life examples to highlight the role of infostealers and valid accounts in Ransomware, and other attacks.
More infoCompromised accounts: The #1 Cause of Cyber BreachesFull DescriptionOct 15, 2024 | 09:00 AM EST
Key Topics:
- The rising threat of valid account credentials in cyber breaches
- The connection between Infostealers and exposed corporate resources
- Real-life examples of Infostealers in ransomware, and other cyberattacks
- How compromised credentials are exploited for major cyber breaches
-
Webinar #3
Live Demo: Proactive Defense Against Ransomware
Oct 29, 2024 | 09:00 AM EST
Host: Irina Nesterovsky
Join Irina Nesterovski, Chief Research Officer at KELA, to learn how to utilize infostealer data for protection and research, plus a LIVE demo of KELA’s Identity Guard - Proactive, Real-Time Defense Against The #1 Cause of Cyber Breaches!
More infoLive Demo: Proactive Defense Against RansomwareFull DescriptionOct 29, 2024 | 09:00 AM EST
Key Topics:
- Mitigating risks associated with compromised assets and identities
- The use of Infostealer data for threat protection and cybersecurity research
- Live demonstration of KELA’s Identity Guard for real-time defense
- Proactive strategies for protecting against credential-based cyber threats
We look forward to seeing you at the webinars!

KELA, 149 5th Ave, New York, NY 10010, United States
Copyright © 2024, KELA
