Hi [[ session.user.profile.firstName ]]
Sort by:
    • Google Docs Email Scam - Why Security Awareness Is Key
      Google Docs Email Scam - Why Security Awareness Is Key Elena Steinke (WSC), Lance Cottrell (Ntrepid), Mounir Hahad (Cyphort Labs), Masha Sedova (Elevate Security) Recorded: May 11 2017 6:00 pm UTC 61 mins
    • Earlier in May, a sophisticated phishing attack masquerading as a Google Docs permission request swept across organizations and individual Gmail users. Every time someone clicked the prompts, the app gained access to the user’s contact list and blasted out a new round of emails, causing a ripple effect of compromised accounts. If Google didn't reach so swiftly to fix the problem, the repercussions across businesses and consumers would have been devastating.

      Join this panel of experts to find out how to prevent the next wave of phishing email scams hurting your organization.
      - What sets this Google Docs email scam from other scams?
      - Why is security awareness a key defense against cyber attacks?
      - What should you be doing today to avoid being a victim tomorrow?

      - Elena Steinke, Cybersecurity Strategic & Tactical Architect & Board Director of Women's Society of Cyberjutsu

      - Lance Cottrell, Chief Scientist at Ntrepid Corp.
      - Mounir Hahad, Sr Director of Cyphort Labs
      - Masha Sedova, Co-Founder of Elevate Security

      Read more >
    • Email: Your Organization’s Best Friend or Worst Enemy?
      Email: Your Organization’s Best Friend or Worst Enemy? Email Recorded: Oct 4 2017 5:00 pm UTC 66 mins
    • In this 60-minute webinar, Pillsbury’s Cathie Meyer and Kroll’s Erik Rasmussen will detail how and why your organization’s best friend in email can quickly turn into your worst enemy. They will discuss ways you can build better security into your email processes and detail the legal and technical best practices of “email hygiene.”

      You will learn:
      • Why and how criminals try to compromise business and organizational emails
      • How they profile targets for maximum impact
      • What technical tools and scams they use to gain access into systems
      • What legal issues exist and how you can address a changing legal landscape
      • How you can improve your protection and response capabilities

      Email security presents unique and sometimes complex challenges, and no system can be 100% failsafe, but you can vastly improve your organization’s ability to defend itself through specific processes and approaches. In this webinar, you will learn strategies and processes you can implement, so your organization can enjoy the full benefits of email while reducing risks.

      Presented by
      • Cathie Meyer, Senior Counsel, Pillsbury
      • Erik Rasmussen, North American Practice Leader, Cyber Security and Investigations, Kroll

      Read more >
    • Google Docs Phishing Scam - What You Need To Know
      Google Docs Phishing Scam - What You Need To Know Vince Tocce (Vince in the Bay Podcast), Nathan Wenzler (AsTech), Kowsik Guruswamy (Menlo Security) Recorded: May 9 2017 6:00 pm UTC 63 mins
    • A massive phishing campaign targeting Google accounts ripped through the internet on a Wednesday afternoon in early May. Phishing scams are pretty common. What sets this scam apart is that it is more convincing than most. The email takes users who click on the file to a legitimate Google sign-in screen to grant permissions. If you received the email or are concerned you might be targeted next, join this interactive Q&A panel to get the facts and protect your account and your organization.

      We'll discuss:
      - What is the Google Docs email scam?
      - How is this scam different from other phishing scams?
      - What's the deal with Eugene Pupov?
      - Who's at risk and how can you avoid being a victim?
      - What can we expect in the future?

      - Vince Tocce, Vince in the Bay Podcast

      - Nathan Wenzler, Chief Security Strategist at AsTech Consulting
      - Kowsik Guruswamy, CTO for Menlo Security

      Read more >
    • Harvey and Irma Phishing Scams & Social Engineering
      Harvey and Irma Phishing Scams & Social Engineering John Bambenek (Fidelis), Dan Lohrmann (Security Mentor), Nathan Wenzler (AsTech) Recorded: Sep 7 2017 5:00 pm UTC 60 mins
    • In the wake of Hurricane Harvey's widespread devastation in late August, many people are pouring in their physical, emotional and financial support for the victims. Massive hurricanes like Harvey and Irma often attract cyber criminals, who view natural disasters as a way to make money.

      US-CERT at the Department of Homeland Security is now warning people to beware of malicious cyber activity seeking to capitalize on interest in Hurricane Harvey.

      Join this interactive Q&A panel as we discuss:
      - Types of cyber scams we should be aware of in the aftermath of Harvey and Irma
      - How to spot a malicious or phishing email from a mile away
      - What to do if you're a victim of a cyber attack
      - Recommendations for cyber safety after major disasters

      - John Bambenek, Threat Systems Manager at Fidelis
      - Dan Lohrmann, CSO & Chief Strategist for Security Mentor
      - Nathan Wenzler, Chief Security Strategist at AsTech Consulting

      Read more >
    • Top cyber threats in the financial sector
      Top cyber threats in the financial sector Candid Wueest, Principal Threat Researcher, Symantec Recorded: Nov 16 2017 3:00 pm UTC 49 mins
    • Financial institutions are increasingly facing attacks on multiple fronts.

      Cyber criminals continue to target online banking using malware to hijack customer transactions and banking sessions. While there has been an overall drop in infections related to these consumer threats, financial institutions are now facing new types of attacks in the form of large-scale financial heists.

      Attack groups such as Fin7 and Lazarus are deliberately targeting financial institutions in audacious attacks that are reaping large rewards. They are using living off the land and fileless attack tactics similar to APT groups. But also extortion with DDoS attacks or business email compromise (BEC) scams are increasingly bothering financial corporations.

      In this webcast on the current financial threat landscape, Symantec takes a look at the most prevalent and significant financial threats.

      In this webcast we will review:
      - The top threats facing financial institutions with statistics and examples
      - Explore the most common techniques employed in financial attacks
      - Provide case studies of the most high-profile financial attacks of the past 12 months

      Read more >
    • Strains of CEO Fraud: Urgent Request for W-2s - Fireside Chat with TruthInIT
      Strains of CEO Fraud: Urgent Request for W-2s - Fireside Chat with TruthInIT Erich Kron CISSP, Security Awareness Advocate Recorded: Feb 15 2018 7:00 pm UTC 53 mins
    • Soon the news will be packed with W-2 phishing and CEO fraud, also known as "Business Email Compromise" attacks. The cost of these attacks against organizations totaled over 5.3 billion dollars.

      Each year the U.S. Internal Revenue Service warns about these scams where internet criminals successfully combine W-2 and CEO fraud schemes, targeting a much wider range of organizations than ever before.

      What's next and how can you protect your organization? Join Erich Kron CISSP, Security Awareness Advocate at KnowBe4, for our Truth in IT webinar “Strains Of CEO Fraud: Urgent Request for W-2s”. We will look at scary features of the new blended and current threats of W-2 phishing and CEO fraud, give actionable info that you need to prevent infections, and what to do when you are hit.

      Read more >
    • Outmoded, Neglected, and Misused. The “POS as a Threat Vector” Probe.
      Outmoded, Neglected, and Misused. The “POS as a Threat Vector” Probe. Nir Valtman, Head of AppSec, NCR | William Dixon, VP Cyber Resilience & Andreas Kaltsounis, Managing Director,Stroz Friedberg Recorded: Jun 21 2017 5:00 pm UTC 64 mins
    • Point of sale (PoS) systems run a significant portion of a retail business and can be found in many other businesses outside of pure retail shops as well. Oftentimes, these systems are running outdated, unpatched operating systems and applications, leaving them wide open for a breach. What’s worse, is that these systems are often used by employees that, many times, have no other computer through which they can access their personal email and social media accounts; further opening them up to both phishing scams and insider abuse.

      In this expert webinar, we will take a deep dive into the mounds of post-breach forensics programs to uncover the commonalities, nuances, and trends that all point to these systems as being one of the top threat vectors within an organization. The findings from multiple viewpoints will lead the attendees through a discussion that prepares them for a breach (protection), how best to respond in during an incident, and how best to manage the forensics aspects after a breach.

      Some of the topics we will explore include:
      -Retail industry challenges with PoS systems
      -Challenges outside the pure retail space
      -Flaws in the architecture of the systems and the networks they connect to
      -Flaws and other misconfigurations that leave these system open for attack
      -Recommendations based on real-world experience pre- and post-breach
      -Review of items often missed during a breach investigation

      Expert Panelists:
      > William Dixon, Vice President Cyber Resilience, Stroz Friedberg, an Aon Company
      > Nir Valtman, Head of Application Security at NCR Corporation
      > Andreas Kaltsounis, Managing Director, Stroz Friedberg, an Aon Company

      > Sean Martin, CISSP, Editor-in-Chief, ITSPmagazine

      Read more >