Faces of Fraud Annual Survey Panel - Dallas

Dallas Fraud Summit 2015

Continuing the "Faces of Fraud" conversation, Tracy Kitten leads a panel discussion with prominent experts in the field.
Watch Now

Spotlight

According to “The Human Factor in Data Protection" study, the most common causes of data loss is loss of laptops or other mobile devices, third party mishaps or flubs and system glitches. Only 8% of incidents were the result of outside actors. the most common causes of data loss is loss of laptops or other mobile devices, third party mishaps or flubs and system glitches. Only 8% of incidents were the result of outside actors. Here are the most common examples of risky practices routinely adopted by employees: 1Putting Company Data at Risk over Free Public Wi-Fi 2Not securing confidential information 3Sharing passwords with others 4Using the same name and password for different websites or online accounts 5Using generic USB to store confidential information 6Leaving computer unattended while away from workplace 60.9 % admit they will utilize any free Wi-Fi source they can find.


OTHER ON-DEMAND WEBINARS

What is the Future of Encryption?

"Encryption has been evolving over the past months and years. Join SSH CEO Tatu Ylönen and discover what is in store for the future of encryption, how it impacts the security industry, as well as society and the economy in the general."

10 Things I Learned by Phishing My Company

Duo Security

Ninety-one percent of organizations in a recent TechValidate survey say they have seen phishing attacks on their organization in the past year. What’s more, 42% report more than 10 phishing attacks on their network in that time. What can be done to thwart this enormous threat and protect your data and users?Phishing simulation tools are a powerful way to see how many and which employees are prone to fall for phishing attacks. With this information in hand, you can determine how to train those who are susceptible to avoid these attempts, and provide the tools to protect against them.

Choose-Your-Own-Device: BYOD Without Security, Governance and Compliance Risks

"There's been a lot of talk the past few years about BYOD/PC and how IT has to embrace it to stay competitive. But, BYO can be very complex to implement -- there are legal issues regarding privacy, IP security issues, and of course issues of on-boarding and off-boarding employees using a multiplicity of devices from remote locations. Why not start simply with a CYOD/PC program instead? It provides the employees access to some of the cool toys they want but IT can still maintain ownership, security, and overall management. In this informative video, learn how to implement a highly cost effective and secure CYOD/PC program."

eSummit 2 - Phishing attacks and Forensics – Where did it all go wrong?

(ISC)2 EMEA

Phishing and Spear Phishing attacks are the number one starting point for most large data breaches. However, no traditional security technology is currently able to mitigate the risks associated with these type of threats. Join this webinar to learn why phishing attacks are so successful, what capabilities organizations need to carry out a forensic investigation and what questions you need to be able to answer following an attack to respond effectively.

Spotlight

According to “The Human Factor in Data Protection" study, the most common causes of data loss is loss of laptops or other mobile devices, third party mishaps or flubs and system glitches. Only 8% of incidents were the result of outside actors. the most common causes of data loss is loss of laptops or other mobile devices, third party mishaps or flubs and system glitches. Only 8% of incidents were the result of outside actors. Here are the most common examples of risky practices routinely adopted by employees: 1Putting Company Data at Risk over Free Public Wi-Fi 2Not securing confidential information 3Sharing passwords with others 4Using the same name and password for different websites or online accounts 5Using generic USB to store confidential information 6Leaving computer unattended while away from workplace 60.9 % admit they will utilize any free Wi-Fi source they can find.

resources