Hi [[ session.user.profile.firstName ]]
Sort by:
    • Google Docs Email Scam - Why Security Awareness Is Key
      Google Docs Email Scam - Why Security Awareness Is Key Elena Steinke (WSC), Lance Cottrell (Ntrepid), Mounir Hahad (Cyphort Labs), Masha Sedova (Elevate Security) Recorded: May 11 2017 6:00 pm UTC 61 mins
    • Earlier in May, a sophisticated phishing attack masquerading as a Google Docs permission request swept across organizations and individual Gmail users. Every time someone clicked the prompts, the app gained access to the user’s contact list and blasted out a new round of emails, causing a ripple effect of compromised accounts. If Google didn't reach so swiftly to fix the problem, the repercussions across businesses and consumers would have been devastating.

      Join this panel of experts to find out how to prevent the next wave of phishing email scams hurting your organization.
      - What sets this Google Docs email scam from other scams?
      - Why is security awareness a key defense against cyber attacks?
      - What should you be doing today to avoid being a victim tomorrow?

      - Elena Steinke, Cybersecurity Strategic & Tactical Architect & Board Director of Women's Society of Cyberjutsu

      - Lance Cottrell, Chief Scientist at Ntrepid Corp.
      - Mounir Hahad, Sr Director of Cyphort Labs
      - Masha Sedova, Co-Founder of Elevate Security

      Read more >
    • Email: Your Organization’s Best Friend or Worst Enemy?
      Email: Your Organization’s Best Friend or Worst Enemy? Email Recorded: Oct 4 2017 5:00 pm UTC 66 mins
    • In this 60-minute webinar, Pillsbury’s Cathie Meyer and Kroll’s Erik Rasmussen will detail how and why your organization’s best friend in email can quickly turn into your worst enemy. They will discuss ways you can build better security into your email processes and detail the legal and technical best practices of “email hygiene.”

      You will learn:
      • Why and how criminals try to compromise business and organizational emails
      • How they profile targets for maximum impact
      • What technical tools and scams they use to gain access into systems
      • What legal issues exist and how you can address a changing legal landscape
      • How you can improve your protection and response capabilities

      Email security presents unique and sometimes complex challenges, and no system can be 100% failsafe, but you can vastly improve your organization’s ability to defend itself through specific processes and approaches. In this webinar, you will learn strategies and processes you can implement, so your organization can enjoy the full benefits of email while reducing risks.

      Presented by
      • Cathie Meyer, Senior Counsel, Pillsbury
      • Erik Rasmussen, North American Practice Leader, Cyber Security and Investigations, Kroll

      Read more >
    • Google Docs Phishing Scam - What You Need To Know
      Google Docs Phishing Scam - What You Need To Know Vince Tocce (Vince in the Bay Podcast), Nathan Wenzler (AsTech), Kowsik Guruswamy (Menlo Security) Recorded: May 9 2017 6:00 pm UTC 63 mins
    • A massive phishing campaign targeting Google accounts ripped through the internet on a Wednesday afternoon in early May. Phishing scams are pretty common. What sets this scam apart is that it is more convincing than most. The email takes users who click on the file to a legitimate Google sign-in screen to grant permissions. If you received the email or are concerned you might be targeted next, join this interactive Q&A panel to get the facts and protect your account and your organization.

      We'll discuss:
      - What is the Google Docs email scam?
      - How is this scam different from other phishing scams?
      - What's the deal with Eugene Pupov?
      - Who's at risk and how can you avoid being a victim?
      - What can we expect in the future?

      - Vince Tocce, Vince in the Bay Podcast

      - Nathan Wenzler, Chief Security Strategist at AsTech Consulting
      - Kowsik Guruswamy, CTO for Menlo Security

      Read more >
    • Harvey and Irma Phishing Scams & Social Engineering
      Harvey and Irma Phishing Scams & Social Engineering John Bambenek (Fidelis), Dan Lohrmann (Security Mentor), Nathan Wenzler (AsTech) Recorded: Sep 7 2017 5:00 pm UTC 60 mins
    • In the wake of Hurricane Harvey's widespread devastation in late August, many people are pouring in their physical, emotional and financial support for the victims. Massive hurricanes like Harvey and Irma often attract cyber criminals, who view natural disasters as a way to make money.

      US-CERT at the Department of Homeland Security is now warning people to beware of malicious cyber activity seeking to capitalize on interest in Hurricane Harvey.

      Join this interactive Q&A panel as we discuss:
      - Types of cyber scams we should be aware of in the aftermath of Harvey and Irma
      - How to spot a malicious or phishing email from a mile away
      - What to do if you're a victim of a cyber attack
      - Recommendations for cyber safety after major disasters

      - John Bambenek, Threat Systems Manager at Fidelis
      - Dan Lohrmann, CSO & Chief Strategist for Security Mentor
      - Nathan Wenzler, Chief Security Strategist at AsTech Consulting

      Read more >
    • Top cyber threats in the financial sector
      Top cyber threats in the financial sector Candid Wueest, Principal Threat Researcher, Symantec Recorded: Nov 16 2017 3:00 pm UTC 49 mins
    • Financial institutions are increasingly facing attacks on multiple fronts.

      Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions. While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing new types of attacks in the form of large-scale financial heists.

      Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards. They are using living off the land and fileless attack tactics similar to APT groups. But also extortion with DDoS attacks or business email compromise (BEC) scams are increasingly bothering financial corporations.

      In this webcast on the current financial threat landscape, Symantec takes a look at the most prevalent and significant financial threats.

      In this webcast we will review:
      - The top threats facing financial institutions with statistics and examples
      - Explore the most common techniques employed in financial attacks
      - Provide case studies of the most high-profile financial attacks of the past 12 months

      Read more >