Hi [[ session.user.profile.firstName ]]

Cofense

  • Date
  • Rating
  • Views
  • Financial Services: Is your organization prepared for a phishing attack?
    Financial Services: Is your organization prepared for a phishing attack?
    Tonia Dudley, Security Solution Advisor, Cofense Recorded: Dec 6 2018 23 mins
    Bad News: Over a third of all phishing attacks target financial institutions.
    Good News: Recent Cofense research shows that when financial companies train employees they will report phishing. In fact, a Cofense customer recently stopped an attack in 10 minutes.

    But how do you know if your organization is ready for an attack? Does your company have the right tools to quickly block threats that evade perimeter defenses?

    In this presentation, we discuss the current state of resiliency against phishing threats in financial services. Cofense expert Tonia Dudley shares her insights on:

    - Year-over-year financial services trends and cross-industry comparisons
    - Simulation response rates relative to current/active threats
    - The industry’s response to active threats
    - Key areas for improvement
  • Phishing: Sinister or Simply Good Business (For the cyberattacker)
    Phishing: Sinister or Simply Good Business (For the cyberattacker)
    Josh Bartolomie Recorded: Nov 7 2018 37 mins
    We hear horror stories about users clicking on some malware-enabled payload and all of a sudden all of the codes for their hardware security fobs are stolen or a business email compromise (CEO fraud) attack has been launched. Unfortunately, these stories are true. Phishing and its cousins, spear phishing, vishing, smishing, pharming, and whaling are all serious security concerns, but are they cyber-Armageddon? This 20/20 editorial webcast with ensuing special report focuses on the realities of phishing and recommends defenses you can use to reduce your risk and make it a less profitable business for the attackers.
  • Phishing Response: Finding the balance between intuition and automation
    Phishing Response: Finding the balance between intuition and automation
    Aaron Higbee, CTO and Co-Founded of Cofense Recorded: Oct 31 2018 29 mins
    When a phishing email makes it past your next-gen perimeter defenses - and it will - what do you do next? One way is through automation, letting the latest blinky boxes take care of the threat, but are they always right? The best response is a blend of documented, repeatable procedures that includes human intuition, along with automation.

    Technology alone is not enough to respond to phishing attacks. In this session, Aaron Higbee, CTO and co-founder of Cofense (formerly PhishMe) will discuss best practices on blending human intuition with automation. Tonia Dudley, Security Solution Adviser, will demonstrate how to stop phishing attacks faster with Cofense Triage.
  • Ask the Healthcare Industry: Phishing is a Pain
    Ask the Healthcare Industry: Phishing is a Pain
    Alexandra Wenisch, Information Security Program Manager, Cofense Recorded: Oct 10 2018 34 mins
    A third of all breaches target healthcare companies. But while phishing defense is an industry must, new Cofense research shows that healthcare lags behind other sectors in recognizing and reporting phishing. If you're in healthcare, or any other industry for that matter, how do you know if your organization is ready for an attack?

    In this presentation, we discuss the current state of healthcare's resiliency against phishing threats. Cofense expert Alexandra Wenisch shares her insights on:

    - Year-over-year healthcare trends and cross-industry comparisons
    - Simulation response rates relative to current/active threats
    - Healthcare’s response to active threats
    - Key areas for improvement
  • Surfing the Global Waves of Phishing
    Surfing the Global Waves of Phishing
    Nik Kalogirou, VP of Sales (APAC), Cofense; Ryan Jones, Sales Engineer, Cofense Recorded: Oct 10 2018 56 mins
    What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats.

    Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.

    Join Cofense and (ISC)² on Oct 10, 2018 (Wed) at 13:00 (Singapore time) to hear about trends that we’ve been seeing around the globe and how they can impact the Asia-Pacific region.

    Presenter: Nik Kalogirou, VP of Sales (APAC), Cofense
    Presenter: Ryan Jones, Sales Engineer, Cofense
    Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
  • Dark Reading: The Real Impact of a Data Security Breach
    Dark Reading: The Real Impact of a Data Security Breach
    Cindi Carter and Josh Bartolomie Recorded: Oct 3 2018 62 mins
    A major breach of your enterprise's critical data could potentially threaten the life of your business. In addition to the potential loss of customer data or intellectual property, a breached company  faces public scrutiny, IT security overhauls, potential lawsuits, brand damage, and loss of customers. In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business –and how an effective data breach response program can help mitigate the damage.
    When you attend this webinar, you will:
    • learn what factors cause the price of an incident to ratchet up higher and higher
    • learn how much cyber insurance can (and cannot) protect you from the costs of a breach
    • learn how much a good incident response team can save your organization
    understand the long-term impacts a data breach can have on your organization and how to prepare for them
  • Into a Dark Realm: The Evolution of Ransomware
    Into a Dark Realm: The Evolution of Ransomware
    Darrel Rendell, Principal Intelligence Analyst, Aaron Riley, Intelligence Analyst, at Cofense Recorded: Sep 20 2018 38 mins
    While ransomware might not be dominating the headlines, it is still a persistent threat that continues to evolve. Weaponized emails still make it past the gateway and ransomware infections happen. Today, variants of ransomware offer “customer support” offered by the cybercriminal for communication and negotiation with the victim. Ransom amounts can vary depending on the perceived wealth of the victim. Ransomware operators also offer flexible payment methods using forms of payment other than Bitcoin and even structured payment/decryption plans. As ransomware evolves, so must your response to these threats.

    This session will help you understand:

    - The impact of what happens if your users are not trained on email scrutiny
    - The multiple effects it can have on your enterprise
    - Techniques to mitigate incidents and bolster your network’s protection against future attacks
  • SCMag 20/20 Webinar: The Ransomware No-Win Scenario
    SCMag 20/20 Webinar: The Ransomware No-Win Scenario
    Brendan Griffin, Threat Intelligence Manager Recorded: Aug 23 2018 31 mins
    Ransomware is a vicious type of malware. Not only can it potentially destroy your data and perhaps even your hardware, it can wreak havoc on your business operations. Ultimately the question a company has to face, of course, is do you pay the ransom for the chance to recover your system or not. If you don’t pay, you potentially could lose everything. If you do pay, you potentially could still lose everything, as well as possibly break various laws. This 20/20 editorial webcast with ensuing special report takes a deeper dive into your options and why you might well face a no-win scenario. It’s the Kobayashi Maru test – do you follow the rules or make your own?
  • Top 5 Phishing Reports You Should Show Your Board
    Top 5 Phishing Reports You Should Show Your Board
    Jim Hansen Recorded: Aug 22 2018 40 mins
    If you are implementing a security awareness program – how do you talk about it with executives? This session will review the top 5 reports that Boards and top executives need to see as you implement a program. They will demonstrate if your plan is working or if changes are needed. These stats about your program will help you plan and secure the gaps between end users and technology while communicating measurable goals.
  • Building a Collaborative Phishing Defense
    Building a Collaborative Phishing Defense
    Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Darrel Rendell, Mollie Holleman, Recorded: Jul 24 2018 60 mins
    What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats. Organizations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Cofense believes solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defense network and feeding their real-time intelligence to security teams for immediate action.
    Speakers:
    Darrel Rendell, Principal Intelligence Analyst, Cofense
    Mollie Holleman, Senior Intelligence Specialist, Cofense

Embed in website or blog