See something say something: A humanistic approach to security intelligence

"Attackers are constantly trying to find new exploits to penetrate network defenses and bypass security controls. In 2014, Mandiant’s M-Trends report indicated that it takes an average of 229 days to detect the presence of a threat actor on an enterprise network. Organizations are starting to realize that the evolution in technologies alone cannot stop such incidents, as the actors continue to change their tactics.

Organizations need to consider supplementing their security technologies and processes with their people. By leveraging employees as human sensors, we not only adopt “see something, say something”, but we are able to add an extra layer of defense and exponentially reduce detection time as well.

In this webinar, PhishMe’s Senior Researchers Ronnie Tokazowski and Shyaam Sundhar will discuss:

• Engaging human sensors as a layer of defense
• Utilizing user reports to detect malware
• Real use cases of user detection within our enterprise"
Watch Now

Spotlight

OTHER ON-DEMAND WEBINARS

The Role of Human Error in Information Security

PECB

It has become an established fact that the human factor is the most important element to secure in any organization if security is to be maintained. This case study will take real-life examples (with no names used!) and examine some actual security incidents caused by human error and elaborate on the root cause and prevention tips resulting from these events.
Watch Now

5 Reasons why a people-centric security strategy safeguards sensitive information and facilitates compliance

Users often ignore internal security controls in order to get work done quickly. This puts the security of confidential information at risk. Tune in to this webinar to learn why a people-centric approach to security is the best way to protect your company’s sensitive data and IP, to achieve and maintain compliance, and to encour
Watch Now

Industrial Cybersecurity: Is Your Facility Protected?

Just last year, cybercriminals attempted to poison the water supply in Florida by hacking into a city’s system. An airplane manufacturer’s confidential customer data files were breached and leaked on the Internet. A major gas pipeline was shut down by a ransomware attack. A major meat producer was forced to close down all its plants. Hackers are now targeting industrial and infrastructure. At the same time, more and more facilities are going to connected operations to empower new efficiencies. How do we keep our facilities protected amid these growing dangers and opportunities?
Watch Now

BlackBerry Cylance 2019 Threat Report Highlights

Cylance

The BlackBerry Cylance 2019 Threat Report Highlights webinar is an opportunity to examine our conclusions with the researchers and analysts who authored the report. Join us for an in-depth look at the cybersecurity trends, topics, and innovations that dominated the past year. Our panel of experts will offer additional insight into the discoveries drawn from our internal data, customer communications, threat research, and intelligence efforts.
Watch Now