Hi [[ session.user.profile.firstName ]]

Latest Attack Trends: Why Employees get Hooked by Phishing Emails

Phishing (including spear phishing), persists as the #1 attack vector used by hackers today – and they continue to launch more sophisticated tactics to gain access to corporate networks and assets. But, did you know these alarming statistics?

-87% of the employees who opened a phishing simulation email did so on the same day it was sent – which means organizations have little time to catch a targeted attack aimed at multiple employees
-Behavioral conditioning decreased susceptible employees’ likelihood to respond to malicious email by 97% after just 4 simulations
-The most effective phishing emails contain a business communication theme and subject line, such as “File from Scanner” or “Unauthorized Activity/Access”

This webinar, based on PhishMe’s recently released Enterprise Phishing Susceptibility Report, will help you understand how complexity and context impact the phishing susceptibility of employees in an organization, and how a continuous security training program has proven to significantly change employee security behavior. This data was collected from our study conducted with 400+ customers across 23 industries by sending over 8 million phishing-simulation emails to more than 3.5 million employees.
Recorded Jan 21 2016 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
John ‘Lex’ Robinson, Principal Client Engagement Manager, PhishMe & John Washko, Product Manager, PhishMe
Presentation preview: Latest Attack Trends: Why Employees get Hooked by Phishing Emails
  • Channel
  • Channel profile
  • Financial Services: Is your organization prepared for a phishing attack? Recorded: Dec 6 2018 23 mins
    Tonia Dudley, Security Solution Advisor, Cofense
    Bad News: Over a third of all phishing attacks target financial institutions.
    Good News: Recent Cofense research shows that when financial companies train employees they will report phishing. In fact, a Cofense customer recently stopped an attack in 10 minutes.

    But how do you know if your organization is ready for an attack? Does your company have the right tools to quickly block threats that evade perimeter defenses?

    In this presentation, we discuss the current state of resiliency against phishing threats in financial services. Cofense expert Tonia Dudley shares her insights on:

    - Year-over-year financial services trends and cross-industry comparisons
    - Simulation response rates relative to current/active threats
    - The industry’s response to active threats
    - Key areas for improvement
  • Phishing: Sinister or Simply Good Business (For the cyberattacker) Recorded: Nov 7 2018 37 mins
    Josh Bartolomie
    We hear horror stories about users clicking on some malware-enabled payload and all of a sudden all of the codes for their hardware security fobs are stolen or a business email compromise (CEO fraud) attack has been launched. Unfortunately, these stories are true. Phishing and its cousins, spear phishing, vishing, smishing, pharming, and whaling are all serious security concerns, but are they cyber-Armageddon? This 20/20 editorial webcast with ensuing special report focuses on the realities of phishing and recommends defenses you can use to reduce your risk and make it a less profitable business for the attackers.
  • Phishing Response: Finding the balance between intuition and automation Recorded: Oct 31 2018 29 mins
    Aaron Higbee, CTO and Co-Founded of Cofense
    When a phishing email makes it past your next-gen perimeter defenses - and it will - what do you do next? One way is through automation, letting the latest blinky boxes take care of the threat, but are they always right? The best response is a blend of documented, repeatable procedures that includes human intuition, along with automation.

    Technology alone is not enough to respond to phishing attacks. In this session, Aaron Higbee, CTO and co-founder of Cofense (formerly PhishMe) will discuss best practices on blending human intuition with automation. Tonia Dudley, Security Solution Adviser, will demonstrate how to stop phishing attacks faster with Cofense Triage.
  • Ask the Healthcare Industry: Phishing is a Pain Recorded: Oct 10 2018 34 mins
    Alexandra Wenisch, Information Security Program Manager, Cofense
    A third of all breaches target healthcare companies. But while phishing defense is an industry must, new Cofense research shows that healthcare lags behind other sectors in recognizing and reporting phishing. If you're in healthcare, or any other industry for that matter, how do you know if your organization is ready for an attack?

    In this presentation, we discuss the current state of healthcare's resiliency against phishing threats. Cofense expert Alexandra Wenisch shares her insights on:

    - Year-over-year healthcare trends and cross-industry comparisons
    - Simulation response rates relative to current/active threats
    - Healthcare’s response to active threats
    - Key areas for improvement
  • Surfing the Global Waves of Phishing Recorded: Oct 10 2018 56 mins
    Nik Kalogirou, VP of Sales (APAC), Cofense; Ryan Jones, Sales Engineer, Cofense
    What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats.

    Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.

    Join Cofense and (ISC)² on Oct 10, 2018 (Wed) at 13:00 (Singapore time) to hear about trends that we’ve been seeing around the globe and how they can impact the Asia-Pacific region.

    Presenter: Nik Kalogirou, VP of Sales (APAC), Cofense
    Presenter: Ryan Jones, Sales Engineer, Cofense
    Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
  • Dark Reading: The Real Impact of a Data Security Breach Recorded: Oct 3 2018 62 mins
    Cindi Carter and Josh Bartolomie
    A major breach of your enterprise's critical data could potentially threaten the life of your business. In addition to the potential loss of customer data or intellectual property, a breached company  faces public scrutiny, IT security overhauls, potential lawsuits, brand damage, and loss of customers. In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business –and how an effective data breach response program can help mitigate the damage.
    When you attend this webinar, you will:
    • learn what factors cause the price of an incident to ratchet up higher and higher
    • learn how much cyber insurance can (and cannot) protect you from the costs of a breach
    • learn how much a good incident response team can save your organization
    understand the long-term impacts a data breach can have on your organization and how to prepare for them
  • Into a Dark Realm: The Evolution of Ransomware Recorded: Sep 20 2018 38 mins
    Darrel Rendell, Principal Intelligence Analyst, Aaron Riley, Intelligence Analyst, at Cofense
    While ransomware might not be dominating the headlines, it is still a persistent threat that continues to evolve. Weaponized emails still make it past the gateway and ransomware infections happen. Today, variants of ransomware offer “customer support” offered by the cybercriminal for communication and negotiation with the victim. Ransom amounts can vary depending on the perceived wealth of the victim. Ransomware operators also offer flexible payment methods using forms of payment other than Bitcoin and even structured payment/decryption plans. As ransomware evolves, so must your response to these threats.

    This session will help you understand:

    - The impact of what happens if your users are not trained on email scrutiny
    - The multiple effects it can have on your enterprise
    - Techniques to mitigate incidents and bolster your network’s protection against future attacks
  • SCMag 20/20 Webinar: The Ransomware No-Win Scenario Recorded: Aug 23 2018 31 mins
    Brendan Griffin, Threat Intelligence Manager
    Ransomware is a vicious type of malware. Not only can it potentially destroy your data and perhaps even your hardware, it can wreak havoc on your business operations. Ultimately the question a company has to face, of course, is do you pay the ransom for the chance to recover your system or not. If you don’t pay, you potentially could lose everything. If you do pay, you potentially could still lose everything, as well as possibly break various laws. This 20/20 editorial webcast with ensuing special report takes a deeper dive into your options and why you might well face a no-win scenario. It’s the Kobayashi Maru test – do you follow the rules or make your own?
  • Top 5 Phishing Reports You Should Show Your Board Recorded: Aug 22 2018 40 mins
    Jim Hansen
    If you are implementing a security awareness program – how do you talk about it with executives? This session will review the top 5 reports that Boards and top executives need to see as you implement a program. They will demonstrate if your plan is working or if changes are needed. These stats about your program will help you plan and secure the gaps between end users and technology while communicating measurable goals.
  • Building a Collaborative Phishing Defense Recorded: Jul 24 2018 60 mins
    Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Darrel Rendell, Mollie Holleman,
    What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats. Organizations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Cofense believes solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defense network and feeding their real-time intelligence to security teams for immediate action.
    Darrel Rendell, Principal Intelligence Analyst, Cofense
    Mollie Holleman, Senior Intelligence Specialist, Cofense
  • Dark Reading Video Webinar: Phishing Trends, Attacks and Defense Strategies Recorded: Jun 14 2018 57 mins
    Aaron Higbee, CTO and CoFounder
    Hear from Aaron Higbee and Lenny Liebmann, contributing editor with InformationWeek as they discuss the latest phishing trends, attacks and defense strategies across global enterprises and some predictions of what to expect in 2018.
  • A Phish Just Hit. Now What? Recorded: Apr 26 2018 49 mins
    John “Lex” Robinson, Anti-Phishing / Cyber Security Strategist at Cofense
    We’re all bombarded by emails. Unfortunately, some are weaponized. They deliver ransomware, other malware, and social engineering scams. What happens when a phishing email gets past your security technologies and lands in employees’ inboxes?

    This webinar will show you how to teach them to spot and report phishing, feed your incident response teams the intel to mitigate attacks and increase overall enterprise resiliency. Take the first step in creating a collective and collaborative defense. One that enables your team to stop email-based threats.
  • 2018 Phishing Trends: New year. New threats. Same dark intentions. Recorded: Feb 20 2018 61 mins
    Adrian Davis, Director of Cybersecurity Advocacy for EMEA, (ISC)², Mollie Holleman, Senior Intelligence Specialist, Phishme
    Join (ISC)² EMEA and PhishMe for a look back at 2017’s threats and a look ahead. We’ll provide an overview of what PhishMe's Intelligence team uncovered, discuss trends in phishing-delivered malware, and analyse how various delivery vectors evolved.

    Some of the trends we’ll discuss:
    •The implications of last year’s major global cyber-events, such as WannaCry and NotPetya
    •The emergence of new ransomware families
    •The abuse of legitimate functions built into business-critical software platforms to deliver malware
    •The favouring of modularity and plug-in accompaniments to lightweight botnet and stealer malwares
    •New ways cyber-criminals are obtaining cryptocurrency

    Cyber-crime won’t slow down. Take this opportunity to learn from the recent past as you deal with current threats and prepare for whatever’s next.
  • Sc Magazine: The Ransomware Payoff Recorded: Feb 15 2018 32 mins
    Brendan Griffin Threat Intelligence Manager, PhishMe
    Ransomware continues to be a headline grabber but where do these attacks rate compared to other cyberattacks? We look at the history of ransomware, it’s not-so-obvious impacts, and how you can prepare for the next attack in today’s 20/20 webinar.
  • 5 Ways to Strengthen Your Phishing Defense Program for 2018 Recorded: Jan 16 2018 57 mins
    John ‘Lex’ Robinson, Anti-Phishing / Cyber Security Strategist
    Whether you’re just getting your program off the ground or looking to optimize your current program, this webinar will give you the knowledge you need. It’s based on proven programs involving over 27 million end users across 160 countries. Tune into to find out what others have done to reduce end-user susceptibility by 95% and build resiliency among their workforce.

    Some of the topics covered include:
    - Best ways to introduce and communicate a program
    - Tips for increasing engagement
    - Most important metrics your Board and C-level Execs will want to review
    - How to handle repeat clickers
  • Taking the Offensive Recorded: Nov 16 2017 42 mins
    John ‘Lex’ Robinson, Anti-Phishing / Cyber Security Strategist
    The bad news: phishing is still the #1 cyber-attack vector. The good news: new PhishMe research shows how you can go on the offensive and strengthen your resiliency to costly phishing attacks.

    Join Lex Robinson, Anti-Phishing / Cyber Security Strategist, as he breaks down data from training simulations and real-life attacks to reveal how you can design a great anti-phishing program. Learn how a proactive approach conditions employees to recognize both active threats—the latest attacks that are costing organizations big-time—and “classic” threats bad actors can recycle whenever they please. See how to gain insights from incident response and phishing intelligence to keep you out in front of evolving threats. You’ll learn how to take the offensive to lower susceptibility, fortify resiliency and disrupt attacks faster.
  • SC Magazine: Know Your Ransomware Enemy Recorded: Oct 20 2017 32 mins
    Stephen Lawton, SC Magazine Editor; Brendan Griffin, Threat Intelligence Manager, PhishMe
    It should come as no surprise to anyone that ransomware has become the hackers’ favored option these days. If you buy in to the scare tactics about ransomware, it’s easy to create, has a high profile in the media and can be lucrative. But like everything else in the data security world, nothing is ever as simple as it seems. This eBook (and corresponding 20/20 webcast) will look at the realities of ransomware, including the real and imagined difficulties of defending against it, the support needed on the attacker’s side to make ransomware effective and tactics victims can take to rid themselves of the malware.
  • Phishing Response: Stop the Chaos Recorded: Oct 3 2017 62 mins
    Adrian Davis, Managing Director, (ISC)² EMEA, John ‘Lex’ Robinson, Marcel Feller, PhishMe
    During a survey recently conducted among security professionals, 90% said phishing is the #1 threat. Yet many acknowledged they’re unprepared to deal with phishing attacks.

    Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your peers are planning to turn the tide against phishing and protect their organisations.

    You will also find out:
    •How bad is the phishing threat?
    •How confident are companies in their phishing responses?
    •What solutions are companies using—and which ones should they add?
    •How can automation and technology help? Why are humans important, too?
  • How To Talk To Your Management About IT Security Recorded: Aug 30 2017 62 mins
    Josh Goldfarb, Co-founder of IDRRA; Jim Hansen, COO, PhishMe
    If you’re a security professional, you understand the cyber threat to your organization and the need for an effective defense. The one big problem: your top management doesn’t. In this useful and insightful webinar, top experts offer recommendations on how to measure the cyber threat posed to your enterprise, the posture of your online defenses, and the needs and achievements of your IT security department. This webinar will bring you some new methods for describing and measuring your cybersecurity initiatives so that they can be understood by even the most business-oriented executives.
  • Live Webinar: Trends in Phishing Response Strategies Recorded: Aug 17 2017 31 mins
    Doug Barth Principal, Founder GatePoint Research and Tim Armstrong Product Marketing, PhishMe
    In early 2017, with the help of Gatepoint Research, PhishMe conducted a survey of select IT executives themed “Phishing Response Strategies”. The participants represent a wide variety of industries including business services, high tech, healthcare, financial services, and more. Survey participants were asked important questions about their current phishing response strategies’ strengths and weaknesses, as well as the current state of their phishing response programs.

    Join PhishMe and Simply Direct for an in-depth review of responses to this survey and discover answers to current challenges relating to Phishing Incident Response in today’s organizations.

    What are the current strategies for detecting and managing phishing attacks?
    What technologies are currently deployed or in process?
    What capabilities would most enhance the phishing management process?
Human Phishing Defense
Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. From driving awareness to security automation and orchestration, our solutions are designed to anticipate and disrupt the attack kill chain at delivery to quickly mitigate the impacts from spear phishing, ransomware, malware, and business email compromise. Today, this is all made real for thousands of global organizations. Learn more at www.cofense.com.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Latest Attack Trends: Why Employees get Hooked by Phishing Emails
  • Live at: Jan 21 2016 5:00 pm
  • Presented by: John ‘Lex’ Robinson, Principal Client Engagement Manager, PhishMe & John Washko, Product Manager, PhishMe
  • From:
Your email has been sent.
or close