Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Human Factor Report 2022: 5 myths of Social Engineering Andy Rose, Resident CISO, Proofpoint; and Jenny Radcliffe, Cybersecurity Consultant, The Human Factor Have you heard of the new breed of “Friendly” fraudsters? Trust is an essential component of social engineering. To persuade someone to interact with ... 1 week ago | 49 mins Human Factor Report 2022: 5 myths of Social Engineering Andy Rose, Resident CISO, Proofpoint; and Jenny Radcliffe, Cybersecurity Consultant, The Human Factor Have you heard of the new breed of “Friendly” fraudsters? Trust is an essential component of social engineering. To persuade someone to interact with ... 2 months ago | 49 mins Der Faktor Mensch 2022 Henning Hanke & Jan Mahler, Proofpoint Germany Der Faktor Mensch 2022: Personenzentrierte Cybersicherheit vor dem Hintergrund zunehmender Anwenderrisiken Bedenken Sie: Wenn es sich bei 10 % Ihrer ... 1 month ago | 46 mins Burnout Is More Than Exhaustion: How Leaders Can Create Resiliency Meghan Stettler, Director at the O.C. Tanner Institute Increased workloads, discontentment, and isolation are pushing people to the point of no return in organizations everywhere. After years of stress and... 22 hours ago | 60 mins Scale It Right: How to Handle the Complexities of Growth Doug Smith, WeWork; Samantha Wellington, TriNet More people can mean needing more space for people to gather. But with the recent changes in the way we experience work, how can your small or medium-... August 23, 2022 5:00pm Cyber Anthropology: Humanising Cyber Security Lianne Potter - Cyber Anthropologist, David McClelland - Technology Reporter, Robert O'Brien - CEO MetaCompliance Human factors, or more specifically, human failure, takes its fair share of the blame for accidents, incidents and cyber attacks. To keep organisation... August 25, 2022 2:00pm 10 of the Craziest Cyberattacks Seen In the Wild and How You Can Avoid Them Roger Grimes (KnowBe4), Dave Littman (Truth In IT) It feels like we hear about a new devastating cyberattack in the news every day. And attack methods seem to be proliferating at an exponential rate. S... 2 days ago | 67 mins On Demand Runtime Application Threat Modeling Joseph Feiman - Chief Strategy Officer, Ganesh Nakhawa - Sr. Director Product Management Avocado Systems Traditional architecture/threat modeling suffer from the length of the time necessary to build the model, heavy human efforts, and inherent inaccuracy... August 23, 2022 3:30pm Want to Truly Feel Alive at Work? Here’s How! Guest: Bruna De Palo > Host: Ann Rockley What’s the difference between happiness and fulfillment at work? How do you reach fulfillment? What makes some people feel alive at work and how could... August 24, 2022 5:00pm Use a People-Centric Defense to Build Resilience to Today's Cyber Threats Daniel Blackford, Senior Threat Researcher, Proofpoint; Jared Peck, Sr. Threat Researcher, Proofpoint; B. Dunlap, Moderator “SMS-based phishing attempts doubled in the U.S. year over year”-- that is just one key finding in Proofpoint’s 2022 Human Factor Threat Report. Th... 4 weeks ago | 60 mins Load more