Cybersecurity Predictions for 2016: Targeting the human factor

The aggressive incorporation of social engineering techniques in the malicious document attachment campaigns that have dominated the threat landscape of 2015 highlights the central place of ‘the human factor’ in the attack chain. In 2016, people are the targets: from email and web to social media and mobile apps, attackers will build on the successes of 2015 by developing campaigns that leverage the human factor to bypass increasingly sophisticated automated detection and response capabilities. Join Patrick Wheeler, Director, Threat Security at Proofpoint, as he presents Cybersecurity Predictions for 2016: Targeting the human factor addressing the shift to increasingly targeted attacks on people behind the devices. Learn how your organization must demand solutions that enable you to: • Take measures to secure data • Effectively track incidents and remediate incidents • Report out on compliance status
Watch Now

Spotlight

On 29th August 2019, the Teh Group organised the Cyber Attack Manila 2019 at Shangri-la Makati with 400 cyber security professionals from various industries including government and law enforcement.  The event covered themes in cyber security, threat intelligence, cyber investigation... just to name a few.  And we have the opportunity to interview some of the speakers of the event and their perspective of cyber security in the Philippines.


OTHER ON-DEMAND WEBINARS

Protect Your Organization from the Unforeseen Implications of Ransomware

Trend Micro

The threat of Ransomware has never been greater with attacks now a significant risk to businesses and organizations of all sizes. In this day and age where data is invaluable, cyber-criminals are taking advantage of people who don’t know a lot about malware behavior. The fear of losing priceless data can push users to pay the ransom – and while they may opt to pay, having their files unlocked or decrypted is never a guarantee.

Kali Linux Overview: Tips, Tricks and Traps for Cybersecurity Professionals

CompTIA

Dr. James Stanger, CompTIA's Chief Technology Evangelist, has consulted with corporations, governments and learning institutions worldwide about cybersecurity, open source, network administration and help desk management for over 20 years. Organizations he has worked with include RSA, IBM, NTT Japan, Symantec, the Scottish Qualifications Authority (SQA), the US Department of Defense (DoD), the United Arab Emirates Cultural Division, the US Department of State, Meisei University, and General Dynamics.

Clear and Present Danger

"Criminal activity is being reported before our eyes in the news and it could be infiltrating your organization -threatening your brands trust and even your job. There is clear and present danger - whether you know it or not. Hear from Kevin Kennedy, VP of Product at Agari, as he examines a real life phishing attack, what impact it had on the person and company who was phished, and what strategies CISOs need to know in order to protect their own organization"

Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball

"If you made it through 2014 without suffering a significant breach, you can consider yourself fortunate. After a year filled with new exploits & high profile breaches, it's time to look back at what we learned and look ahead to the trends that will surely have an impact in 2015. Join Mike Rothman, President of Security Analyst firm Securosis, and Patrick Bedwell, VP of Product Marketing for AlienVault, for an entertaining overview of key trends you should consider as you plan for 2015. In this session, Mike and Patrick will cover: Trends in the threat landscape that will bring new infosec challenges How those challenges will affect your network security strategy A 2015 ""shopping list"" of core technologies you should consider to secure your environment in 2015"

Spotlight

On 29th August 2019, the Teh Group organised the Cyber Attack Manila 2019 at Shangri-la Makati with 400 cyber security professionals from various industries including government and law enforcement.  The event covered themes in cyber security, threat intelligence, cyber investigation... just to name a few.  And we have the opportunity to interview some of the speakers of the event and their perspective of cyber security in the Philippines.

resources