Hi [[ session.user.profile.firstName ]]
Sort by:
    • Spear Phishing: How to Avoid Becoming a Hacker's Trophy Phish Spear Phishing: How to Avoid Becoming a Hacker's Trophy Phish Phil Lin, Director, Product Marketing, FireEye Recorded: Dec 12 2012 5:00 pm UTC 48 mins
    • Spear phishing continues to be highly effective and quickly becoming the "new normal". This talk will review recent IT security reports that show how and why spear phishing attacks are so successful as well as tips to secure against next-generation spear phishing threats.

      Threat actors use spear phishing to exploit your network and trigger an attack which can lead to catastrophic financial, operations, and reputation risks. Discover how to keep your network secure — by learning more about today's spear phishing attacks and how you can close the security gap that sophisticated attackers are exploiting. This session will discuss real-time techniques to analyze and quarantine spear phishing attacks with great accuracy.

      Key topics include:

      - The growing popularity of spear phishing tactics
      - How advanced cyber attacks are triggered and staged
      - A real-world example of spear phishing that lead to an advanced cyber attack
      - Real-time techniques to help you mitigate the threat of spear phishing

      Read more >
    • Spear Phishing: How to Avoid Becoming a Hacker's Trophy Phish Spear Phishing: How to Avoid Becoming a Hacker's Trophy Phish Phil Lin, Director, Product Marketing, FireEye Recorded: Jun 20 2012 7:00 pm UTC 48 mins
    • Recent IT security reports show that targeted spear phishing attacks are dramatically increasing. The news of the recent Flame malware has shown that advanced targeted attacks are growing in intensity and are quickly becoming the new ‘normal’.

      Spear phishing has become a successful tactic that hackers use to exploit your network and trigger an attack which can lead to catastrophic financial, operational, and reputation risks. Discover how to keep your network secure – by learning more about today’s targeted spear phishing attacks and how you can close the security gap that sophisticated hackers are exploiting. Key topics include:

      - The growing popularity of spear phishing tactics and how targeted attacks are triggered

      - A real-world example of spear phishing that led to an advanced targeted attack

      - Real-time techniques to help you mitigate the threat of spear phishing

      Read more >
    • Protecting Against Spear Phishing Protecting Against Spear Phishing Chris Taylor Recorded: Jul 29 2015 12:00 pm UTC 36 mins
    • Over 90% of targeted attacks start with email. Criminals create very convincing emails to trick your users into clicking on a link, opening an attachment, or replying with their credentials. The attack methods criminals employ with phishing emails are constantly changing and so must your email security to block these attacks before damage occurs. Learn about the newest trends in phishing email attacks and how to protect your organization.

      Read more >
    • Protecting Against Spear Phishing Protecting Against Spear Phishing Chris Taylor Recorded: Jul 23 2015 3:00 am UTC 36 mins
    • Over 90% of targeted attacks start with email. Criminals create very convincing emails to trick your users into clicking on a link, opening an attachment, or replying with their credentials. The attack methods criminals employ with phishing emails are constantly changing and so must your email security to block these attacks before damage occurs. Learn about the newest trends in phishing email attacks and how to protect your organization.

      Read more >
    • Spear Phishing & Today’s Cyber Attacks Spear Phishing & Today’s Cyber Attacks Harry Sverdlove, CTO, Bit9 Recorded: Nov 15 2011 3:00 pm UTC 46 mins
    • Every day you are being targeted by cybercriminals. You do your best to educate and enforce policy, but hackers are working tirelessly to gain your users' trust. Unfortunately, some offers are too good to refuse.
      Join us for this live webcast featuring Bit9's CTO Harry Sverdlove to learn how to protect against the most common technique used in today's targeted attacks:

      - How spear phishing works and how attackers choose their targets
      - Why this very low-tech approach has resulted in massive breaches at some of the largest, most technically sophisticated companies
      - The weakest links in security and how to protect against these customized attacks
      - Best practices for protecting against modern threats

      Read more >
    • Spear Phishing: The Silent Nuke in the Hacker Arsenal Spear Phishing: The Silent Nuke in the Hacker Arsenal Rohyt Belani | Intrepidus Group Recorded: Aug 12 2009 1:00 pm UTC 45 mins
    • This presentation will discuss the evolution of phishing from being a means of stealing user identities to becoming a mainstay of organized crime.
      Today, (spear) phishing is a key component in a "hackers" repertoire. It has been used to hijack online brokerage accounts to aid pump 'n dump stock
      scams, and as a means of creating covert channels from compromised user machines to the Internet.

      During this talk, Rohyt will present the techniques
      used by attackers to execute such attacks and real-world cases that he has responded to that will provide perspective on the impact. This will be followed by a discussion on what works and what doesn't in building and testing user awareness to thwart such attacks against your organization.

      Read more >
    • Prevent Spear-Phishing - Put Your Users in a Bubble Prevent Spear-Phishing - Put Your Users in a Bubble McAfee and Invincea Recorded: May 15 2012 5:00 pm UTC 34 mins
    • Your users face a constant threat of spear-phishing, zero-day attacks, and APTs. Until now, the answer to the spear-phishing threat has largely been end-user training. Join McAfee and Invincea for a look at a smart new solution to the problem – endpoint security software that puts every user in a bubble. In this session, you’ll learn:

      • How Invincea and McAfee offer comprehensive protection to every endpoint
      • An answer to the threat of zero-day attacks and APTs that protects every user
      • Rich threat intelligence that feeds McAfee ePO dashboards to make your security administrator even more effective

      Read more >
    • Why you need Phishing Incident Response Why you need Phishing Incident Response William Galway, Director of Product Management, PhishMe, Jesse Lands, Triage Security Engineering Manager, PhishMe Recorded: Jul 12 2016 5:00 pm UTC 42 mins
    • Even with all your processes and technology in place, phishing attacks containing ransomware and other malware continue to penetrate your defenses. With 91% of all attacks on enterprise networks being the result of successful phishing attempts, organizations need an efficient and effective phishing incident response plan.

      PhishMe Triage enables SOC and IR teams to quickly process and analyze real phishing threats to their organizations. PhishMe Triage customers have been able to quickly find and remediate attacks in progress and improve phishing threat analysis efficiency from hours to mere minutes. PhishMe Triage also frees up the manual resources previously needed to process the thousands of malicious emails reported by employees.
      Join PhishMe experts to learn more:
      - How PhishMe Triage creates fast and effective phishing incident response process
      - Real customer use cases and successes using PhishMe Triage
      - PhishMe Triage integration with multiple security solutions

      Read more >
    • Phishing Awareness: Why employees get hooked by phishing emails Phishing Awareness: Why employees get hooked by phishing emails Adrian Davis (ISC)², Jim Hansen, John ‘Lex’ Robinson, PhishMe Recorded: May 17 2016 12:00 pm UTC 61 mins
    • Phishing has been well established as the top entry method for hackers attempting to breach corporate networks and proliferate data. Yet, in spite of record spending on security technology, data breach reports continue to highlight the substantial lag between incident occurrence and detection.

      Those investments are failing while organisations continue to neglect their final and best line of defense – their employees. Employees hold the key to fortifying the last line of defense and providing IT and Security teams with critical real-time attack intelligence. But it begs the question – do you know how to properly protect your employees and your organisation’s assets? What motivates employee behavior to fall for such attacks?

      In this webinar, PhishMe’s Jim Hansen and John “Lex” Robinson will discuss:
      •The current state of phishing
      •The success and failure of technology systems and how human systems can protect the last mile
      •How conditioning – not training – empowers employees to identify and report phishing attacks
      •Factors that impact an employee's susceptibility to fall victim to an attack
      •Keys to building a successful Human Phishing Defense

      Moderator: Adrian Davis, MD, (ISC)² EMEA
      Speakers: Jim Hansen, COO, PhishMe; John ‘Lex’ Robinson, Principal Client Engagement Manager, PhishMe

      Read more >
    • Proactive Phishing Reporting for Incident Response Proactive Phishing Reporting for Incident Response Javvad Malik, 451 Research, and Allan Carey, PhishMe Recorded: Apr 23 2014 2:00 pm UTC 48 mins
    • Spear phishing is widely recognized as one of the most dangerous threats to enterprise security. Whether the attackers are criminals looking for easy access to credit information or nation states and APT groups more interested in sensitive intellectual property, the result of the attack is the same: gaining access to the victim’s network in order to steal information. From this foothold they employ sophisticated malware to extend their presence, identify valuable data, and exfiltrate that information for their use.

      From an incident response (IR) perspective, time is of the essence. Timely and actionable intelligence is needed to minimize the window of exposure and mitigate. During this webinar, Javvad Malik of 451 Research and Allan Carey of PhishMe will discuss:

      • How you can reduce the risk of phishing attacks compromising your environment.
      • The value of various threat intelligence sources to aid the IR process.
      • A new method for leveraging trained staff as part of your attack detection system, increasing visibility of real phishing efforts.

      Read more >
    • Latest Attack Trends: Why Employees get Hooked by Phishing Emails Latest Attack Trends: Why Employees get Hooked by Phishing Emails John ‘Lex’ Robinson, Principal Client Engagement Manager, PhishMe & John Washko, Product Manager, PhishMe Recorded: Jan 21 2016 5:00 pm UTC 60 mins
    • Phishing (including spear phishing), persists as the #1 attack vector used by hackers today – and they continue to launch more sophisticated tactics to gain access to corporate networks and assets. But, did you know these alarming statistics?

      -87% of the employees who opened a phishing simulation email did so on the same day it was sent – which means organizations have little time to catch a targeted attack aimed at multiple employees
      -Behavioral conditioning decreased susceptible employees’ likelihood to respond to malicious email by 97% after just 4 simulations
      -The most effective phishing emails contain a business communication theme and subject line, such as “File from Scanner” or “Unauthorized Activity/Access”

      This webinar, based on PhishMe’s recently released Enterprise Phishing Susceptibility Report, will help you understand how complexity and context impact the phishing susceptibility of employees in an organization, and how a continuous security training program has proven to significantly change employee security behavior. This data was collected from our study conducted with 400+ customers across 23 industries by sending over 8 million phishing-simulation emails to more than 3.5 million employees.

      Read more >
    • User Anti-Phishing Training: How to Build a Successful Program User Anti-Phishing Training: How to Build a Successful Program Diana Garcia, Customer Onboarding and Training Manager, PhishMe Recorded: Sep 30 2015 5:00 pm UTC 47 mins
    • As spear phishing continues to be one of the top security threats, enterprises have looked to user training programs to bolster their defenses. One of the main challenges security awareness professionals face is implementing a phishing training program which shows continuous improvement and value to their organization. How do you start and build upon a training program to showcase continuous success?

      The key to implementing an effective program is to focus on the biggest threats and leverage behavioral metrics to drive your program. During this webinar, Diana Garcia, Manager, Customer Onboarding and Training, will cover:

      -How do you implement a phishing awareness program and run it continuously?
      -What are the key elements of a successful program and what does it look like?
      -How do you show the value this program and your trained users add to the security organization?

      Read more >