Hi [[ session.user.profile.firstName ]]

PhishMe, Inc.

  • Date
  • Rating
  • Views
  • 2016 Malware Year in Review: Tricks, Threats, and Triumphs
    2016 Malware Year in Review: Tricks, Threats, and Triumphs Brendan Griffin, Threat Intelligence Manager at PhishMe Recorded: Mar 14 2017 60 mins
    In 2016, the PhishMe Intelligence team saw over 2,500 active threat reports, the widespread implementation of anti-analysis methods, a notable evolution in techniques and tools to deliver malware, and the growing threat of encryption ransomware.

    Now more than ever, it has become more important to detect and interdict malware during the delivery phase. What can you do to defend your environment? What will threat actors do to step things up in 2017?

    Join Brendan Griffin, to learn about:

    •The evolution of malware and encrypted ransomware
    •2016’s most prevalent threats
    •Identifying the latest malware delivery tools and techniques
    •Developing a modern defense strategy and empowering your users
    •What to look out for in 2017
  • Technology Can Stop Phishing Breaches?  Oh, Really??
    Technology Can Stop Phishing Breaches? Oh, Really?? John ‘Lex’ Robinson, Principal Information Security Consultant at PhishMe Recorded: Feb 21 2017 45 mins
    Ransomware was the #1 cybersecurity threat in 2016. Phishing continues to thrive as the #1 attack vector used by hackers today. And technology continues to fail to stop it.

    In 2016, spear-phishing attacks rose 55%, Ransomware attacks grew 4X and Business Email Compromise (BEC) losses skyrocketed 1300%.

    Join PhishMe as we look back on the top attacks and explore how to use a combination of Human and Technology to stop phishing attempts before they progress to a breach. In this presentation, we will cover:
    - The big phishes of 2016 and what to look out for in 2017
    - Why good employees click on bad emails – the emotional and situational triggers
    - How engagement can decrease susceptibility
    - How IR teams can stay on top of attacks in progress
  • Q3 Malware Review:  Evolution of Locky and Quiet Malware
    Q3 Malware Review: Evolution of Locky and Quiet Malware Brendan Griffin, Threat Intelligence Manager, PhishMe Recorded: Nov 16 2016 33 mins
    During the third quarter of 2016, the PhishMe Intelligence team generated 689 active threat reports that highlighted indicators of compromise, tactics, and techniques that serve as the hallmarks of phishing attacks. Two key stories stood out this quarter. Locky continued to steal headlines as the dominant ransomware by continuing to innovate and avoid detection by experts. Meanwhile, other, quieter malware remained an ever-present threat to companies of all sizes. Join Brendan Griffin, Threat Intelligence Manager, PhishMe to learn about:

    •Evolution of Locky Ransomware
    •Challenges faced by malware researchers against the constantly evolving ransomware
    •Quiet malware and their proliferation
    •Ransomware versus Quiet Malware business models
  • The Best Defense Against Cyber Attacks You’ve Never Heard Of...
    The Best Defense Against Cyber Attacks You’ve Never Heard Of... Scott Crawford, Research Director of Information Security, 451 Research | Allan Carey, VP of Business Development, PhishMe Recorded: Nov 9 2016 47 mins
    With all the attention paid to the technological sophistication of cyber attacks, as well as to the new technologies arising to strengthen defense, one fact often gets overlooked: Security is fundamentally about people.

    The adversary is an intelligent actor – while the target is often human as well. The compromise of sensitive information or functionality may be in the crosshairs, but it’s people that are often targeted to gain a foothold inside the victim organization, through techniques such as phishing or social engineering. But here’s the secret: In this targeting lies one of the most unsuspected – but potentially rich – assets to defense an organization can have.

    In this webcast, Scott Crawford, Research Director of Information Security for 451 Research, and Allan Carey, Vice President of Business Development from PhishMe take a closer look at:

    •How the targeting of people through phishing, impersonation attacks and social engineering can be leveraged to improve security and resistance to attack
    •New tactics and tools that make the most of human engagement to defend organizations against these exploits
    •Ways to enhance incident response by incorporating human interactions with malicious activity into the evidence chain
  • Enterprise Susceptibility Trends – Can conditioned employees turn the tide again
    Enterprise Susceptibility Trends – Can conditioned employees turn the tide again John ‘Lex’ Robinson, Principal Client Engagement Manager at PhishMe Recorded: Nov 3 2016 39 mins
    Phishing (including spear phishing), persists as the #1 attack vector used by hackers today. So far in 2016, spear-phishing attacks are up 55%, Ransomware attacks are up 4X and Business Email Compromise (BEC) losses are up 1300%.

    PhishMe analyzed customer responses to over 56 million simulated phishing emails sent between 2015-2016 to identify various phishing susceptibility trends amongst employees. Join John “Lex” Robinson, Principal Client Engagement Manager to learn more about –

    · Emotional motivators that cause employees to be more susceptible to phishing emails

    · How baselining phishing risk to your organization improves your threat response.

    · The value of repetition in changing user behaviors from susceptibility to reporting.
  • Make The Most Out Of Your Email Security Data
    Make The Most Out Of Your Email Security Data Kelley Mak, Former Forrester Analyst | Scott Greaux, PhishMe Recorded: Sep 20 2016 58 mins
    Email remains an essential tool for business communication and collaboration as well as customer engagement. Because of its pervasiveness and business importance, it is a common – even preferred – attack vector for both cybercriminals and fraudsters that can result in devastating breaches and other financial losses. Yet, security teams can leverage the data from email to enhance their ability to detect, analyze, and respond to critical email security incidents, as well as leverage the threat intelligence for other security technologies.

    In this webinar, former Forrester Analyst Kelley Mak will join Scott Greaux from PhishMe to:
    •Provide an overview of today's email security challenges across on-premise and hosted cloud email deployments
    •Discuss the need for in-depth email incident response capabilities, including internal and external threat analysis, prioritization, and rapid response
    •Provide recommendations on how security teams can refine the email events in their enterprise into valuable threat intelligence
  • 2016 Q2 Malware Review: Ransomware Maturity and Evasion Techniques
    2016 Q2 Malware Review: Ransomware Maturity and Evasion Techniques Brendan Griffin, Threat Intelligence Manager, PhishMe Recorded: Aug 24 2016 34 mins
    During the second quarter of 2016, ransomware has firmly established itself as a mature business model, showing no outward signs of diminishing. Encryption ransomware now accounts for 50% of all malware delivery configurations, meaning that it is no longer considered simply a means for making a quick profit, but a permanent fixture on the threat landscape.
    This webcast will discuss how ransomware has now become a successful business and reveals findings on the use of steganography and ciphers in malware delivery. Join Brendan Griffin, Threat Intelligence Manager, PhishMe to learn about:
    •Encryption Ransomware
    •Rise in Evasion Techniques
    •How simple attacks can still inflict massive harm
  • Technology Is Not Enough! Why Building a Human Defense is the Key to Fighting
    Technology Is Not Enough! Why Building a Human Defense is the Key to Fighting Nick Hayes, Senior Analyst, Forrester Research | Rohyt Belani, Founder & CEO, PhishMe Recorded: Jul 19 2016 61 mins
    For too long the human element has been wildly underutilized in protecting valuable assets and defending against prolific cyber-attacks. Security awareness initiatives are often sporadic, employing uninspired materials that yield little to no results – ultimately rendering security technologies useless due to easily avoidable human mistakes. A continued focus on security awareness alone is a plan doomed to fail. Instead, by shifting our focus to conditioning workforce behaviors through immersive experiences, security best practices become ingrained in daily workflow, helping to not only recognize and report on attack attempts, but weaponizing human intelligence to assist security operations, incident response and security event management in eliminating phishing threats.

    Join guest speaker Nick Hayes, security analyst at Forrester Research, and Rohyt Belani, CEO and co-founder of PhishMe, as they demonstrate how building the right defense programs and teams can effectively change security culture, evolving from awareness to sophisticated strategies that achieve real results. In this webinar, you’ll learn:

    •Why security awareness alone is failing the enterprise
    •How to unlock the power of human driven intelligence
    •Tips on speeding incident response
  • Why you need Phishing Incident Response
    Why you need Phishing Incident Response William Galway, Director of Product Management, PhishMe, Jesse Lands, Triage Security Engineering Manager, PhishMe Recorded: Jul 12 2016 42 mins
    Even with all your processes and technology in place, phishing attacks containing ransomware and other malware continue to penetrate your defenses. With 91% of all attacks on enterprise networks being the result of successful phishing attempts, organizations need an efficient and effective phishing incident response plan.

    PhishMe Triage enables SOC and IR teams to quickly process and analyze real phishing threats to their organizations. PhishMe Triage customers have been able to quickly find and remediate attacks in progress and improve phishing threat analysis efficiency from hours to mere minutes. PhishMe Triage also frees up the manual resources previously needed to process the thousands of malicious emails reported by employees.
    Join PhishMe experts to learn more:
    - How PhishMe Triage creates fast and effective phishing incident response process
    - Real customer use cases and successes using PhishMe Triage
    - PhishMe Triage integration with multiple security solutions
  • 2016 Q1 Malware Review: Ransomware Trends and Tactics
    2016 Q1 Malware Review: Ransomware Trends and Tactics Brendan Griffin, Threat Intelligence Manager, PhishMe Recorded: Jun 9 2016 30 mins
    During the first quarter of 2016, the PhishMe Intelligence team generated 612 Active Threat Reports detailing waves of phishing emails that delivered malware to victims around the world each day. What stood out the most was the proliferation of encryption ransomware. It has grown to become the most common type of malware utilized through soft targeting and massively distributed attacks. This webcast will discuss the spread of ransomware and why it is so successful. Join Brendan Griffin, Senior Threat Intelligence Analyst, PhishMe to learn about:

    •Trends in ransomware
    •Tactics used to bypass your defenses
    •Stopping the threat

Embed in website or blog