How to Recognize and Prevent Social Engineering Attacks

BetterCloud

Social engineering is nothing new. From the Trojan Horse that collapsed Troy to Frank Abagnale's famous deceptions portrayed in the film Catch Me If You Can, conmen and hackers have preyed on people’s innate tendency to trust. We invite you to listen in as internationally recognized technology analyst Michael Krigsman leads a discussion featuring four social engineering experts.
Watch Now

Spotlight

Dependence on third parties isn't slowing down, in fact 74% of management believe third parties will play. Third parties will continue to be targeted as long as their vulnerabilities go unchecked, and current security ratings and scorecards are insufficient measures.


OTHER ON-DEMAND WEBINARS

Cyber Due Diligence: Pre-Transaction Assessment Can Uncover Costly Risks

How can you ensure that an investment target isn’t one keystroke away from a major cyber incident or data breach? How can you be sure that an attacker isn’t already lurking in their network? CYBER DUE DILIGENCE conducted prior to investment can identify actual or potential cyber security lapses, areas that may be at risk, quantify remediation costs and help restructure an investment should substandard cyber security systems data or latent breaches be discovered. Join us for this online event and hear Kroll’s Tim Ryan describe how Kroll cyber experts can help uncover the cyber vulnerabilities you may be buying unwittingly, know if you are buying a company with an undisclosed data breach, and reveal breach-breeding weaknesses in the target company’s culture
Watch Now

Phishing Awareness and Response: Can Technology Alone Make a Difference?

PhishMe, Inc

Phishing has been well established as the top entry method for hackers trying to access corporate networks. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection. That technology- those investments are failing while organizations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence.
Watch Now

"The Blind Spot – getting over the skills shortage"

GICIS

There are a great deal of "cyber" skilled professionals within the industry, as opposed to what is claimed by the world governments. The term “cyber” itself has lead to the discrimination of valuable professionals who do not feature cyber certifications in their CVs, as recruiters operate on the basis of scanning systems that filter out CVs that do not mention the term du jour creating, therefore creating a blind spot. The creation of sexy new terminology will continue and within a short space of time, the rhetoric will have shifted more to securing the Internet of Things, the interconnectivity issues, the computer network exploitation (CNE) challenges and the ethics of artificial intelligence. “Cyber” will not be the only game in town. Tune in to listen to Andrea on how addressing to this blind spot, might assist the industry with the apparently shortage of skills.
Watch Now

How to Remove Complexity as a Threat to Security

Cyxtera

No doubt as a security leader you are constantly making decisions on what tools and solutions are needed to secure your elusive IT landscape. Complexity may be threatening your security posture as you react to secure your hybrid workloads. Join Leo Taddeo, CISO at Cyxtera and former Special Agent in Charge of the Special Operations/Cyber Division of the FBI’s New York Office alongside Jason Garbis and Ian Breeze of Cyxtera, as we address the mounting complexity security professionals face today. Access the webinar replay to hear recommendations for removing unnecessary complexity that threatens your cyber resiliency.
Watch Now

Spotlight

Dependence on third parties isn't slowing down, in fact 74% of management believe third parties will play. Third parties will continue to be targeted as long as their vulnerabilities go unchecked, and current security ratings and scorecards are insufficient measures.

resources