Channel Futures
Email phishing remains a top security threat. Even smart and savvy people are fooled everyday by these malicious emails. They’re even harder to spot now that bad actors use information from social media to personalize their attacks against your customers and your business. In this webinar, Brian Wickenhauser, Mastercard’s Vice President of Security Events Management, will share examples of phishing attempts, how to spot them, ways to combat them and tips for improved safety – all important information to add to your security training programs.
Watch Now
As cyber attacks pose a growing, more serious threat to supply chain operations, our supply chains are not as secure as they should be. Supply chain leaders are not experts in cybersecurity, and they need to establish tight governance approaches with IT and security counterparts across the enterprise to protect supply chain IT, cyber-physical systems, and products. The threat vectors extend well beyond the enterprise, reaching into the third-party supply chain ecosystems. This complimentary webinar explores the cyber risks that supply chains face, and the steps supply chain leaders can take to manage those risks, including talent, collaboration and transparency approaches.
Watch Now
IFAC
In today’s digital age, many people have at some point wondered whether their online accounts have been compromised or have been part of a large data breach. Like a lot of the issues that make the news on a regular basis, we can become desensitized to cyber risks, but it is imperative, especially for organizations of all sizes, to be vigilant and educate their employees and stakeholders on proper protocols and procedures for minimizing risk. Accounting professionals are in a unique position to address cybersecurity.
Watch Now
ISACA
Today it is almost considered negligent to wait for an alert from IDS/IPS, firewalls, NAC, and endpoint security products before taking action. For years some of us who ha e been in the industry for a while have engaged in operations where we go out into the environment and actively look for threats to hand off to the IR team to eradicate. Enter the world of threat hunting. We will side step any product marketing and dig deep into what threat hunting actually is. The second half of this webinar will consist of demo of some technical threat hunting operations that anyone can practice sharpening their hunt skills.
Watch Now