Social media and email phishing: How to protect financial information from fraudsters

Email phishing remains a top security threat. Even smart and savvy people are fooled everyday by these malicious emails. They’re even harder to spot now that bad actors use information from social media to personalize their attacks against your customers and your business. In this webinar, Brian Wickenhauser, Mastercard’s Vice President of Security Events Management, will share examples of phishing attempts, how to spot them, ways to combat them and tips for improved safety – all important information to add to your security training programs.
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

OTHER ON-DEMAND WEBINARS

Understanding privacy regulations and compliance

Baker Tilly

Data is among an organization’s most valuable assets. Its management and protection should be viewed as a mission-critical stewardship rather than mere compliance. Larger and more costly cybersecurity incidents coincide with annually increasing regulatory and liability pressures. Looming U.S. privacy legislation on the horizon coupled with the General Data Protection Regulation’s impacts (Google recently received a $57 million fine), intensifies pressure on organizations to understand their legal compliance obligations and to safeguard private information.
Watch Now

Microsoft 365 Security in the Face of Increased Mobility & Security Breaches

With technological advancements taking the world by storm, almost every other company is now a software company. All these companies are slowly moving to the cloud to reduce IT investment. Whether it is delivering personalized apps, or employing software to improve internal processes or managing business transactions – it is all on the cloud. This recent expansion of technology has made the threat of cyberattacks exceedingly prevalent and more aggressive.
Watch Now

DEFEND, DETECT, AND REMEDIATE: A 360�� VIEW OF CYBERSECURITY STRATEGIES

Secure-24

When it comes to securing information systems from breaches, the best medicine is a dose of prevention. In this complimentary webinar, panelists discuss top security threats and trends, business impacts, and the components of an effective, preventive cyber security program. The webinar addressed the following objectives: Evaluate top trends impacting information security. Describe how organizations can work smarter to enhance cybersecurity programs, despite resource and financial constraints. Evaluate effective cybersecurity measures and policies. Describe considerations and resources for educating employees.
Watch Now

The Pesky Password Problem: How Hackers and Defenders Battle for Your Network Control

KnowBe4

What really makes a “strong” password? And why are your end-users tortured with them in the first place? How do hackers crack your passwords with ease? And what can/should you do about your authentication methods? In this unique webinar you will learn about the recent NIST controversy and related password cracking problems. The “combatants” will be on the one side KnowBe4's Chief Hacking Officer, Kevin Mitnick with decades of first-hand “red-side” penetration testing experience, and on the other side Roger Grimes, KnowBe4's Data-Driven Defense Evangelist with decades of experience on the blue team.
Watch Now

Spotlight

Cyber attacks are increasing in volume, sophistication, and severity, and the federal government has taken notice. Now, they’re taking action — most recently in the form of new cybersecurity rules from the Securities and Exchange Commission. In “11 Ways to Streamline SEC Cybersecurity Compliance with Risk Cloud,” we explore a va

resources