BSI and Proofpoint: State of the Phish Webinar

BSI

Join BSI for a webinar where we’ll explore findings from the 2019 State of the Phish Report by our partner, Proofpoint. It provides the data-driven intelligence you and your team need to manage end-user risk more effectively within your organization. In this webinar, we will explore data related to the following: Tens of millions of simulated phishing emails: Analysis of tens of millions of simulated phishing emails sent to end users over a 12-month period. 16 industries: Comparisons of activities and results from organizations and their employees across 16 industries. Nearly 15,000 survey responses from infosec professionals: Responses reveal the challenges they are facing, their views of the threat landscape, and the actions they’re taking to fend off phishing attacks.
Watch Now

Spotlight

"Increasingly skillful at stealing data and disrupting network operations, cyber criminals wreak havoc with numerous, large-scale data breaches. As these attacks happen more frequently, it’s only a matter of time before your company becomes a target. Some organizations will be aware of those breaches (or even prevent them) and take corrective action, but most will not even know they happened. With the “hacking industry” approximately three to five times the size of the security industry, the global hacking economy is real. But what does this mean? It means that threats are imminent, multifaceted, and evolved beyond imagination. It means your company is vulnerable."

OTHER ON-DEMAND WEBINARS

Top Ten Ways to Handle Contracts Effectively In-House

Handling a large number of contracts is a fact of life for most in-house attorneys – with an ever-increasing volume and tight deadlines, even before a M&A or other event triggers a voluminous contract review. But it doesn’t have to be chaotic or disorganized: with the right processes and tools you can provide strong, responsive
Watch Now

Using AI/Machine Learning in Cybersecurity

Trend Micro

AI and machine learning have proven to be valuable technologies when it comes to detecting threats at time zero and across various vectors. But there is a time and place for its usage. Join me during my monthly threat webinar and live Q&A session to learn: How you can help improve your ability to detect zero-hour threats by implementing AI/machine learning techniques. Areas in which Trend Micro has been using these AI/machine learning techniques. Why the best threat detection comes from a cross-generational blend of technologies.
Watch Now

How NHS Bolton Empowers Its Security Team with AI

Watch this webinar to hear how NHS Bolton Foundation Trust, a UK regional healthcare provider has overcome stretched resources using an innovative approach of automation and AI.
Watch Now

ATT&CK Deep Dive: Lateral Movement

Carbon Black

Join Red Canary, Carbon Black, and MITRE ATT&CK™ for a deep dive into lateral movement detection. This hands-on webinar will demonstrate how applying lateral movement detection tactics and techniques can help you find higher level actors in your environment and improve the efficacy of your security program.
Watch Now

Spotlight

"Increasingly skillful at stealing data and disrupting network operations, cyber criminals wreak havoc with numerous, large-scale data breaches. As these attacks happen more frequently, it’s only a matter of time before your company becomes a target. Some organizations will be aware of those breaches (or even prevent them) and take corrective action, but most will not even know they happened. With the “hacking industry” approximately three to five times the size of the security industry, the global hacking economy is real. But what does this mean? It means that threats are imminent, multifaceted, and evolved beyond imagination. It means your company is vulnerable."

resources