Counter the Careless Click, Tools to Help You Train Your Users

KnowBe4

Many IT pros know users are the weakest link in network security but don’t exactly know where to start when it comes to creating a security awareness program that will work for their organization. Join this 30-minute webinar “Counter the careless click, tools to help you train your users” where Erich Kron CISSP, Security Awareness Advocate of KnowBe4, will provide a practical session with tips and free tools you can implement now to help you create your “human firewall”.
Watch Now

Spotlight

The cyber risk landscape is evolving rapidly in a multitude of areas. Governments are facing an unprecedented level of cyber attacks and threats with the potential to undermine national security and critical infrastructure, while businesses that store confidential customer and client information online are fighting to maintain their reputations in the wake of massive data breaches


OTHER ON-DEMAND WEBINARS

BYOx: developing and deploying effective strategies to safeguard data

"As the trend of employees using smartphones and tablets as corporate access devices in the workplace grows, businesses of all sizes continue to see information security risks being exploited. These risks stem from both internal and external threats including mismanagement of the device itself, external manipulation of software vulnerabilities and the deployment of poorly tested, unreliable business applications. During this webinar Steve Durbin, Managing Director of ISF, will explain why it is important for organisations to embrace these new technologies to develop and deploy effective enterprise-wide strategies and to safeguard their data."

Financial eCrime 2.0: How Fraudsters Leverage Brands to Deliver Phishing & Malware Attacks

Information Security Media Group

Nothing is more valuable to a business than its own reputation. That is why brand attacks, which leverage a company's valuable brand for nefarious purposes, must be battled on every possible front. Brand attacks are the new form of eCrime, and they're being perpetrated in new and rapidly evolving ways including phishing, and -- more recently -- malware.

Five Steps to a Zero Trust Network - From Theory to Practice

"A Zero Trust network abolishes the quaint idea of a “trusted” internal network demarcated by a corporate perimeter. Instead it advocates microperimeters of control and visibility around the enterprise’s most sensitive data assets and the ways in which the enterprise uses its data to achieve its business objectives. In this webinar, guest speaker John Kindervag, Vice President and Principal Analyst at Forrester Research, and Nimmy Reichenberg, VP of Strategy at AlgoSec will explain why a Zero Trust network should be the foundation of your security strategy, and present best practices to help companies achieve a Zero Trust state."

Cyber security and process network control for internal auditors

ACCA

When it comes to cyber security, it is not just the financial systems that you need to worry about. The risk is far greater on the operational side, terrorists and criminals can attack your business and they can do it online. If terrorists accessed a chemical or nuclear plant then catastrophic damage would be possible.

Spotlight

The cyber risk landscape is evolving rapidly in a multitude of areas. Governments are facing an unprecedented level of cyber attacks and threats with the potential to undermine national security and critical infrastructure, while businesses that store confidential customer and client information online are fighting to maintain their reputations in the wake of massive data breaches

resources