Hi [[ session.user.profile.firstName ]]
Sort by:
    • Google Docs Email Scam - Why Security Awareness Is Key
      Google Docs Email Scam - Why Security Awareness Is Key Elena Steinke (WSC), Lance Cottrell (Ntrepid), Mounir Hahad (Cyphort Labs), Masha Sedova (Elevate Security) Recorded: May 11 2017 6:00 pm UTC 61 mins
    • Earlier in May, a sophisticated phishing attack masquerading as a Google Docs permission request swept across organizations and individual Gmail users. Every time someone clicked the prompts, the app gained access to the user’s contact list and blasted out a new round of emails, causing a ripple effect of compromised accounts. If Google didn't reach so swiftly to fix the problem, the repercussions across businesses and consumers would have been devastating.

      Join this panel of experts to find out how to prevent the next wave of phishing email scams hurting your organization.
      - What sets this Google Docs email scam from other scams?
      - Why is security awareness a key defense against cyber attacks?
      - What should you be doing today to avoid being a victim tomorrow?

      Moderator:
      - Elena Steinke, Cybersecurity Strategic & Tactical Architect & Board Director of Women's Society of Cyberjutsu

      Speakers:
      - Lance Cottrell, Chief Scientist at Ntrepid Corp.
      - Mounir Hahad, Sr Director of Cyphort Labs
      - Masha Sedova, Co-Founder of Elevate Security

      Read more >
    • CEO Fraud: The Latest Business Email Compromise Scams
      CEO Fraud: The Latest Business Email Compromise Scams David Littman, Erich Kron Recorded: Sep 24 2018 1:55 pm UTC 63 mins
    • The bad guys are getting very creative, impersonating an executive in your organization and asking for financial reports or they ask employees in payroll to make changes to bank accounts. According to the FBI, their efforts have earned them an estimated $12 billion through Business Email Compromise also know as CEO fraud scams. And to make things worse, these attackers can be working on multiple potential victims at the same time.

      In the event you'll learn:

      ~ The truth about Business Email Compromise

      ~ How to defend against these attacks using technical and non-technical controls

      ~ Why building a human firewall is your best layer of defense

      Invoice fraud, escrow redirection, payroll fraud, and simple wire transfer fraud are all tools in the attacker's arsenal. Defending against these types of phishing attacks is possible by layering technical and non-technical controls.

      Watch this on-demand webinar, as we take an in-depth look at how the latest attacks work and the psychology and mechanics behind them. We also discuss defensive measures you can take now to defend your organization against these attacks.

      Read more >
    • Email: Your Organization’s Best Friend or Worst Enemy?
      Email: Your Organization’s Best Friend or Worst Enemy? Email Recorded: Oct 4 2017 5:00 pm UTC 66 mins
    • In this 60-minute webinar, Pillsbury’s Cathie Meyer and Kroll’s Erik Rasmussen will detail how and why your organization’s best friend in email can quickly turn into your worst enemy. They will discuss ways you can build better security into your email processes and detail the legal and technical best practices of “email hygiene.”

      You will learn:
      • Why and how criminals try to compromise business and organizational emails
      • How they profile targets for maximum impact
      • What technical tools and scams they use to gain access into systems
      • What legal issues exist and how you can address a changing legal landscape
      • How you can improve your protection and response capabilities

      Email security presents unique and sometimes complex challenges, and no system can be 100% failsafe, but you can vastly improve your organization’s ability to defend itself through specific processes and approaches. In this webinar, you will learn strategies and processes you can implement, so your organization can enjoy the full benefits of email while reducing risks.

      Presented by
      • Cathie Meyer, Senior Counsel, Pillsbury
      • Erik Rasmussen, North American Practice Leader, Cyber Security and Investigations, Kroll

      Read more >
    • Google Docs Phishing Scam - What You Need To Know
      Google Docs Phishing Scam - What You Need To Know Vince Tocce (Vince in the Bay Podcast), Nathan Wenzler (AsTech), Kowsik Guruswamy (Menlo Security) Recorded: May 9 2017 6:00 pm UTC 63 mins
    • A massive phishing campaign targeting Google accounts ripped through the internet on a Wednesday afternoon in early May. Phishing scams are pretty common. What sets this scam apart is that it is more convincing than most. The email takes users who click on the file to a legitimate Google sign-in screen to grant permissions. If you received the email or are concerned you might be targeted next, join this interactive Q&A panel to get the facts and protect your account and your organization.

      We'll discuss:
      - What is the Google Docs email scam?
      - How is this scam different from other phishing scams?
      - What's the deal with Eugene Pupov?
      - Who's at risk and how can you avoid being a victim?
      - What can we expect in the future?

      Moderator:
      - Vince Tocce, Vince in the Bay Podcast

      Speakers:
      - Nathan Wenzler, Chief Security Strategist at AsTech Consulting
      - Kowsik Guruswamy, CTO for Menlo Security

      Read more >
    • Harvey and Irma Phishing Scams & Social Engineering
      Harvey and Irma Phishing Scams & Social Engineering John Bambenek (Fidelis), Dan Lohrmann (Security Mentor), Nathan Wenzler (AsTech) Recorded: Sep 7 2017 5:00 pm UTC 60 mins
    • In the wake of Hurricane Harvey's widespread devastation in late August, many people are pouring in their physical, emotional and financial support for the victims. Massive hurricanes like Harvey and Irma often attract cyber criminals, who view natural disasters as a way to make money.

      US-CERT at the Department of Homeland Security is now warning people to beware of malicious cyber activity seeking to capitalize on interest in Hurricane Harvey.

      Join this interactive Q&A panel as we discuss:
      - Types of cyber scams we should be aware of in the aftermath of Harvey and Irma
      - How to spot a malicious or phishing email from a mile away
      - What to do if you're a victim of a cyber attack
      - Recommendations for cyber safety after major disasters

      Speakers:
      - John Bambenek, Threat Systems Manager at Fidelis
      - Dan Lohrmann, CSO & Chief Strategist for Security Mentor
      - Nathan Wenzler, Chief Security Strategist at AsTech Consulting

      Read more >
    • Live Demo: Phishing Simulation and Security Awareness Training
      Live Demo: Phishing Simulation and Security Awareness Training Jen Gough, Sales Engineer, Proofpoint Recorded: Nov 20 2018 3:00 pm UTC 30 mins
    • What are the key components of a best-in-class solution for phishing simulation and training?

      Join us for a live demo of Wombat Security to see for yourself!

      Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.


      You’ll learn how to:

      - Assess your users’ susceptibility to phishing and spear phishing attacks
      - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
      - Allow your employees to report suspicious messages with a single mouse click

      Read more >
    • Phishing Awareness Tools | Wombat demo
      Phishing Awareness Tools | Wombat demo Proofpoint Recorded: Dec 4 2018 7:00 pm UTC 60 mins
    • What are the key components of a best-in-class solution for phishing simulation and training?

      Join us for a live demo of Wombat Security to see for yourself!
      Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space.

      You’ll learn how to:

      - Assess your users’ susceptibility to phishing and spear phishing attacks
      - Give your users hands-on practice at recognizing and avoiding phishing attacks and other social engineering scams
      - Allow your employees to report suspicious messages with a single mouse click

      Read more >