10 Incredible ways you can be hacked through email and how to stop the bad guys

WorkCast

Email is still the #1 attack vector the bad guys use. A whopping 91% of cyberattacks start with a phishing email, but email hacking is much more than phishing and launching malware! Join us and Roger A. Grimes, KnowBe4's Data-Driven Defense Evangelist and security expert with over 30-years of experience, as we explore 10 ways hackers use social engineering to trick your users into revealing sensitive data or enabling malicious code to run. Plus, we'll share a (pre-filmed) hacking demo by KnowBe4's Chief Hacking Officer Kevin Mitnick.
Watch Now

Spotlight

The shift to using software- as-a-service (SaaS) models to enable network security is gaining momentum on a global scale. However, making sense of the SaaS security landscape can be challenging. As they consider their options, organizations worldwide can ensure more effective implementations by including three essential elements in their overall SaaS security strategies.

OTHER ON-DEMAND WEBINARS

Top 5 Reasons Hackers Want Your Employees’ Mobile Devices

Zimperium

While most organizations are realizing that they need to protect their employees’ mobile devices in order to protect confidential corporate data, some companies try to remain blissfully naive to the hacking opportunities smartphones and tablets present. Given the ever-growing use of mobile devices and the number of mobile cyberattacks, companies can no longer plead ignorance to these mobile threats.
Watch Now

Impact of Your Business Continuity Program on Cyber Resiliency

Business Continuity Awareness Week 2018 - Impact of your business continuity program on Cyber Resiliency. Every division inside IBM has a fully functional Business Continuity program focused on identifying what's critical to IBM's internal operations and making sure these business processes remain operational at time of disaster
Watch Now

Five Phases of Ethical Hacking

GreyCampus

GreyCampus & EC-Council together bring in an informative 1-hour webinar for ethical hacking aspirants. Our subject matter expert will take you through the 5 phases of Ethical Hacking out of the 18 mentioned above. The webinar will follow as per the outline below: Introduction to Ethical Hacking & Career Opportunities. Phases of Ethical Hacking. Phase 1 – Reconnaissance.
Watch Now

Learn the Ins and Outs of a Security-Aware Culture from a Forrester Expert

MediaPRO

Developing and maintaining a security-aware culture in an organization has become vital in the defense against modern cyberthreats. But such a culture cannot be expected to develop overnight. Building such a culture is a journey, not a miracle, with many pitfalls along the way. That’s why we’re here to help. Watch our on-webinar Harden the Human Firewall by Building Awareness, Behavior, and Culture, with MediaPRO Chief Learning Officer Tom Pendergast guest speaker Forrester analyst Jinan Budge to learn how to instill a culture of security through an engaging, meaningful, and even entertaining security awareness program.
Watch Now

Spotlight

The shift to using software- as-a-service (SaaS) models to enable network security is gaining momentum on a global scale. However, making sense of the SaaS security landscape can be challenging. As they consider their options, organizations worldwide can ensure more effective implementations by including three essential elements in their overall SaaS security strategies.

resources