SEGASEC
While current anti-phishing solutions usually cover basic entry-level phishing scams using reactive inside-the-firewall defenses, a billion of potential variations of sophisticated phishing scams are already being planned and executed everywhere on the internet, entirely undisturbed, evading most current detection tools. Todays phishing attacks are no longer performed by scruffy hoodie covered villains, but by sophisticated, risk-calculating, online marketing experts who take social engineering to new heights. By constantly using A/B testing to improve their technology with each attack, they know how to tell a convincing story that would trick even the savviest users, causing irreversible reputational and financial damages to brands worldwide.
Watch Now
SANS
WannaCry, NotPetya, and TRITON demonstrate that ICS and IIoT networks continue to be soft targets for cyberattacks, increasing the risk of costly downtime, safety failures, environmental incidents, and theft of sensitive intellectual property. NIST and the NCCoE recently published a NIST Interagency Report (NISTIR) demonstrating how off-the-shelf, ICS-aware behavioral anomaly detection (BAD) effectively reduces cyber risk for manufacturing organizations, without impacting OT networks, as well as risk from equipment malfunctions.
Watch Now
Alpine Security
Alpine Security's CEO, Christian Espinosa, will discuss the Top 5 common information security misconceptions and what trends are contributing to our cyber defense ineffectiveness. Christian will also cover actionable solutions for each of the Top 5 problem areas. Topics covered include: Cloud Solutions and Problems. Threats to Small Businesses. Next Gen Firewall Issues. Value of Data from Attacker Perspective. How Egos Get in the Way.
Watch Now
Cylance
Join Cylance® as we discuss effective methods of risk management across three main components of the modern attack surface – endpoints, applications, and users. Each component brings with it varying methods of attack and strategies for threat mitigation. In this webinar, Cylance will discuss best practices for minimizing and protecting these critical aspects of your attack surface.
Watch Now