Hi [[ session.user.profile.firstName ]]

PhishMe, Inc.

  • Date
  • Rating
  • Views
  • Make The Most Out Of Your Email Security Data Make The Most Out Of Your Email Security Data Kelley Mak, Former Forrester Analyst | Scott Greaux, PhishMe Recorded: Sep 20 2016 58 mins
    Email remains an essential tool for business communication and collaboration as well as customer engagement. Because of its pervasiveness and business importance, it is a common – even preferred – attack vector for both cybercriminals and fraudsters that can result in devastating breaches and other financial losses. Yet, security teams can leverage the data from email to enhance their ability to detect, analyze, and respond to critical email security incidents, as well as leverage the threat intelligence for other security technologies.

    In this webinar, former Forrester Analyst Kelley Mak will join Scott Greaux from PhishMe to:
    •Provide an overview of today's email security challenges across on-premise and hosted cloud email deployments
    •Discuss the need for in-depth email incident response capabilities, including internal and external threat analysis, prioritization, and rapid response
    •Provide recommendations on how security teams can refine the email events in their enterprise into valuable threat intelligence
  • 2016 Q2 Malware Review: Ransomware Maturity and Evasion Techniques 2016 Q2 Malware Review: Ransomware Maturity and Evasion Techniques Brendan Griffin, Threat Intelligence Manager, PhishMe Recorded: Aug 24 2016 34 mins
    During the second quarter of 2016, ransomware has firmly established itself as a mature business model, showing no outward signs of diminishing. Encryption ransomware now accounts for 50% of all malware delivery configurations, meaning that it is no longer considered simply a means for making a quick profit, but a permanent fixture on the threat landscape.
    This webcast will discuss how ransomware has now become a successful business and reveals findings on the use of steganography and ciphers in malware delivery. Join Brendan Griffin, Threat Intelligence Manager, PhishMe to learn about:
    •Encryption Ransomware
    •Rise in Evasion Techniques
    •How simple attacks can still inflict massive harm
  • Technology Is Not Enough! Why Building a Human Defense is the Key to Fighting Technology Is Not Enough! Why Building a Human Defense is the Key to Fighting Nick Hayes, Senior Analyst, Forrester Research | Rohyt Belani, Founder & CEO, PhishMe Recorded: Jul 19 2016 61 mins
    For too long the human element has been wildly underutilized in protecting valuable assets and defending against prolific cyber-attacks. Security awareness initiatives are often sporadic, employing uninspired materials that yield little to no results – ultimately rendering security technologies useless due to easily avoidable human mistakes. A continued focus on security awareness alone is a plan doomed to fail. Instead, by shifting our focus to conditioning workforce behaviors through immersive experiences, security best practices become ingrained in daily workflow, helping to not only recognize and report on attack attempts, but weaponizing human intelligence to assist security operations, incident response and security event management in eliminating phishing threats.

    Join guest speaker Nick Hayes, security analyst at Forrester Research, and Rohyt Belani, CEO and co-founder of PhishMe, as they demonstrate how building the right defense programs and teams can effectively change security culture, evolving from awareness to sophisticated strategies that achieve real results. In this webinar, you’ll learn:

    •Why security awareness alone is failing the enterprise
    •How to unlock the power of human driven intelligence
    •Tips on speeding incident response
  • Why you need Phishing Incident Response Why you need Phishing Incident Response William Galway, Director of Product Management, PhishMe, Jesse Lands, Triage Security Engineering Manager, PhishMe Recorded: Jul 12 2016 42 mins
    Even with all your processes and technology in place, phishing attacks containing ransomware and other malware continue to penetrate your defenses. With 91% of all attacks on enterprise networks being the result of successful phishing attempts, organizations need an efficient and effective phishing incident response plan.

    PhishMe Triage enables SOC and IR teams to quickly process and analyze real phishing threats to their organizations. PhishMe Triage customers have been able to quickly find and remediate attacks in progress and improve phishing threat analysis efficiency from hours to mere minutes. PhishMe Triage also frees up the manual resources previously needed to process the thousands of malicious emails reported by employees.
    Join PhishMe experts to learn more:
    - How PhishMe Triage creates fast and effective phishing incident response process
    - Real customer use cases and successes using PhishMe Triage
    - PhishMe Triage integration with multiple security solutions
  • 2016 Q1 Malware Review: Ransomware Trends and Tactics 2016 Q1 Malware Review: Ransomware Trends and Tactics Brendan Griffin, Threat Intelligence Manager, PhishMe Recorded: Jun 9 2016 30 mins
    During the first quarter of 2016, the PhishMe Intelligence team generated 612 Active Threat Reports detailing waves of phishing emails that delivered malware to victims around the world each day. What stood out the most was the proliferation of encryption ransomware. It has grown to become the most common type of malware utilized through soft targeting and massively distributed attacks. This webcast will discuss the spread of ransomware and why it is so successful. Join Brendan Griffin, Senior Threat Intelligence Analyst, PhishMe to learn about:

    •Trends in ransomware
    •Tactics used to bypass your defenses
    •Stopping the threat
  • Activating the Human: Transforming your biggest risk into your biggest asset Activating the Human: Transforming your biggest risk into your biggest asset Aaron Higbee, CTO & Co-Founder, PhishMe + Scott Greaux, Vice President, Product Management, PhishMe Recorded: May 19 2016 62 mins
    In 2015, phishing related breaches dominated security news headlines, and the trend continues into 2016 with a rise in ransomware incidents. Even with record spending on security technology solutions, phishing remains the greatest threat to organizations.

    As phishing success depends on human error, organizations need to better leverage their most important resources in the battle – their employees. The phrase “All it takes is one” no longer has a negative meaning when all employees are empowered as the last line of security defense after the malicious email passed through porous security systems in place. And, not only can employees be fortified to resist phishing attempts, they also hold the key to providing IT and Security teams with timely company-specific attack intelligence.

    In this webinar, PhishMe’s Aaron Higbee and Scott Greaux will discuss:

    · The success and failure of technology systems

    · How conditioning – not awareness – empowers employees to identify and report phishing attacks

    · How critical attack intelligence generated from employees can be used to detect attacks – in progress
  • Phishing Awareness: Why employees get hooked by phishing emails Phishing Awareness: Why employees get hooked by phishing emails Adrian Davis (ISC)², Jim Hansen, John ‘Lex’ Robinson, PhishMe Recorded: May 17 2016 61 mins
    Phishing has been well established as the top entry method for hackers attempting to breach corporate networks and proliferate data. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.

    Those investments are failing while organisations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence. But it begs the question – do you know how to properly protect your employees and your organisation’s assets? What motivates employee behavior to fall for such attacks?

    In this webinar, PhishMe’s Jim Hansen and John “Lex” Robinson will discuss:
    •The current state of phishing
    •The success and failure of technology systems and how human systems can protect the last mile
    •How conditioning – not training – empowers employees to identify and report phishing attacks
    •Factors that impact an employee's susceptibility to fall victim to an attack
    •Keys to building a successful Human Phishing Defense

    Moderator: Adrian Davis, MD, (ISC)² EMEA
    Speakers: Jim Hansen, COO, PhishMe; John ‘Lex’ Robinson, Principal Client Engagement Manager, PhishMe
  • APT Threat Actors Prefer Phishing APT Threat Actors Prefer Phishing Brendan Griffin, Threat Intelligence Manager & Hugh Docherty, Product Management Director Recorded: Mar 31 2016 31 mins
    APT threat actors frequently have access to advanced resource and sponsors with deep pockets yet their preferred attack vector continues to be through phishing. This presentation explores the motivations, toolset, and attack surfaces of some of the world’s most prolific APT groups. Examples of recent attacks and case studies are used to demonstrate the effectiveness of distinct types of phishing attacks and their expected results.
  • Phishing, Malware and Incidents – Oh my! How to handle the daily deluge. Phishing, Malware and Incidents – Oh my! How to handle the daily deluge. David MacKinnon, Director of Research and William Galway, Product Manager and former Incident Responder Recorded: Mar 23 2016 59 mins
    No one understands the strain of constant battle better than those in Incident Response (IR). Daily cyber assaults require an unattainable perfect response – every time. However, teams are constantly working within constraints and breaches continue to occur in record number. Technology has been introduced to help but has failed time and time again. Breach identification takes an exorbitantly long time. And above all, attackers continue to target that last line of defense – the vulnerable, easily fooled human assets. When that last line of defense is surpassed, the IR team is expected to catch the attacks in progress – wading through millions of false alerts while attackers continue to hone their approach and deliver evolved malicious payloads.

    It’s enough to make you wonder why you got into this line of work!

    Join PhishMe’s David MacKinnon and Will Galway to hear why it’s not all doom and gloom. Previous to PhishMe, both David and Will worked as incident responders in the Fortune 500 market, collecting years of security operations insight and best practices to share. In this session, you’ll gain tips and knowledge around new threats and solutions for Incident Responders such as:

    •The new wave of malware to watch for and trends and threats collected from 2015
    •The evolution of phishing emails, their targets and the payloads they deliver
    •How to forge a new line of defense and triage potential attacks – quickly and easily
  • Latest Attack Trends: Why Employees get Hooked by Phishing Emails Latest Attack Trends: Why Employees get Hooked by Phishing Emails John ‘Lex’ Robinson, Principal Client Engagement Manager, PhishMe & John Washko, Product Manager, PhishMe Recorded: Jan 21 2016 60 mins
    Phishing (including spear phishing), persists as the #1 attack vector used by hackers today – and they continue to launch more sophisticated tactics to gain access to corporate networks and assets. But, did you know these alarming statistics?

    -87% of the employees who opened a phishing simulation email did so on the same day it was sent – which means organizations have little time to catch a targeted attack aimed at multiple employees
    -Behavioral conditioning decreased susceptible employees’ likelihood to respond to malicious email by 97% after just 4 simulations
    -The most effective phishing emails contain a business communication theme and subject line, such as “File from Scanner” or “Unauthorized Activity/Access”

    This webinar, based on PhishMe’s recently released Enterprise Phishing Susceptibility Report, will help you understand how complexity and context impact the phishing susceptibility of employees in an organization, and how a continuous security training program has proven to significantly change employee security behavior. This data was collected from our study conducted with 400+ customers across 23 industries by sending over 8 million phishing-simulation emails to more than 3.5 million employees.

Embed in website or blog