How to Excite your staff about Social Engineering & Awareness

Proofpoint

Highly-targeted, low volume spear phishing--or business email compromise (BEC)--attacks that impersonate executives and business partners to trick employees are the biggest cyber threat organisations face today. This is not news.  But what may come as a surprise is that the vast majority of BEC attacks are preventable. According to Gartner, Secure Email Gateways are struggling to address social engineering attacks with no payload. But things are changing. New technology can now surpass people and process initiatives to proactively protect email channels, while also removing the guesswork for users.
Watch Now

Spotlight

While many enterprise IT organizations believe that they already have effective solutions in place for preventing malware from invading corporate networks, the traditional defensive approaches currently in use today may actually pose a significant source of risk. Malware analysis can help mitigate this risk if implemented as part of a comprehensive defensive strategy based on the premise that no preventive solutions are fully effective against advanced modern malware attacks.


OTHER ON-DEMAND WEBINARS

A Maturity Model for Healthcare Cybersecurity

Palo Alto Networks

Palo Alto Networks security platform provides hundreds of capabilities for reducing the attack surface of healthcare organizations - But which ones should you focus on implementing first? Join us for this webinar presenting the Healthcare Maturity Model, by Matt Mellen, a former security operations lead at a hospital in California.

Patch Management and Cybersecurity, 2015/2016: A Look Back, A Look Ahead

Landesk

With numerous high-profile, high-impact hacks and security breaches reported throughout the year, 2015 was certainly a tumultuous year for IT and security managers and their teams. And 2016 shows no signs of being any less roiling.How best to respond and prepare? Join members of the Shavlik team in this Webinar, to review the lessons learned in 2015, and to gain insights to help you plan to make your enterprise more secure, in 2016 and beyond.

5 Vital Signs for Healthy Cloud Security

As business continues to leverage cloud infrastructure services learn what key vital signs security professionals should use to determine the overall security wellness of cloud workloads. Hear about the trends that may change the mindset of what is good security hygiene when forced to support multi-cloud environments.

3 Flaws with the Defense-in-Depth Security Model and How to Improve It

Infocyte

Reports of network intrusions have spiked in recent years resulting in millions in financial loses, theft of intellectual property, and exposure of customer information. The groups responsible for these attacks are organized and can persist in your organization’s systems and endpoints without detection for 6 months on average – sometimes years. The approach many organizations take to prevent these attacks is to simply layer on increasing numbers of defensive solutions – clearly a better approach is needed.

Spotlight

While many enterprise IT organizations believe that they already have effective solutions in place for preventing malware from invading corporate networks, the traditional defensive approaches currently in use today may actually pose a significant source of risk. Malware analysis can help mitigate this risk if implemented as part of a comprehensive defensive strategy based on the premise that no preventive solutions are fully effective against advanced modern malware attacks.

resources