Email remains an essential tool for business communication and collaboration as well as customer engagement. Because of its pervasiveness and business importance, it is a common – even preferred – attack vector for both cybercriminals and fraudsters that can result in devastating breaches and other financial losses. Yet, security teams can leverage the data from email to enhance their ability to detect, analyze, and respond to critical email security incidents, as well as leverage the threat intelligence for other security technologies.
In this webinar, former Forrester Analyst Kelley Mak will join Scott Greaux from PhishMe to:
•Provide an overview of today's email security challenges across on-premise and hosted cloud email deployments
•Discuss the need for in-depth email incident response capabilities, including internal and external threat analysis, prioritization, and rapid response
•Provide recommendations on how security teams can refine the email events in their enterprise into valuable threat intelligence
RecordedSep 20 201658 mins
Your place is confirmed, we'll send you email reminders
Bad News: Over a third of all phishing attacks target financial institutions.
Good News: Recent Cofense research shows that when financial companies train employees they will report phishing. In fact, a Cofense customer recently stopped an attack in 10 minutes.
But how do you know if your organization is ready for an attack? Does your company have the right tools to quickly block threats that evade perimeter defenses?
In this presentation, we discuss the current state of resiliency against phishing threats in financial services. Cofense expert Tonia Dudley shares her insights on:
- Year-over-year financial services trends and cross-industry comparisons
- Simulation response rates relative to current/active threats
- The industry’s response to active threats
- Key areas for improvement
We hear horror stories about users clicking on some malware-enabled payload and all of a sudden all of the codes for their hardware security fobs are stolen or a business email compromise (CEO fraud) attack has been launched. Unfortunately, these stories are true. Phishing and its cousins, spear phishing, vishing, smishing, pharming, and whaling are all serious security concerns, but are they cyber-Armageddon? This 20/20 editorial webcast with ensuing special report focuses on the realities of phishing and recommends defenses you can use to reduce your risk and make it a less profitable business for the attackers.
When a phishing email makes it past your next-gen perimeter defenses - and it will - what do you do next? One way is through automation, letting the latest blinky boxes take care of the threat, but are they always right? The best response is a blend of documented, repeatable procedures that includes human intuition, along with automation.
Technology alone is not enough to respond to phishing attacks. In this session, Aaron Higbee, CTO and co-founder of Cofense (formerly PhishMe) will discuss best practices on blending human intuition with automation. Tonia Dudley, Security Solution Adviser, will demonstrate how to stop phishing attacks faster with Cofense Triage.
Alexandra Wenisch, Information Security Program Manager, Cofense
A third of all breaches target healthcare companies. But while phishing defense is an industry must, new Cofense research shows that healthcare lags behind other sectors in recognizing and reporting phishing. If you're in healthcare, or any other industry for that matter, how do you know if your organization is ready for an attack?
In this presentation, we discuss the current state of healthcare's resiliency against phishing threats. Cofense expert Alexandra Wenisch shares her insights on:
- Year-over-year healthcare trends and cross-industry comparisons
- Simulation response rates relative to current/active threats
- Healthcare’s response to active threats
- Key areas for improvement
Nik Kalogirou, VP of Sales (APAC), Cofense; Ryan Jones, Sales Engineer, Cofense
What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats.
Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.
Join Cofense and (ISC)² on Oct 10, 2018 (Wed) at 13:00 (Singapore time) to hear about trends that we’ve been seeing around the globe and how they can impact the Asia-Pacific region.
Presenter: Nik Kalogirou, VP of Sales (APAC), Cofense
Presenter: Ryan Jones, Sales Engineer, Cofense
Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
A major breach of your enterprise's critical data could potentially threaten the life of your business. In addition to the potential loss of customer data or intellectual property, a breached company faces public scrutiny, IT security overhauls, potential lawsuits, brand damage, and loss of customers. In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business –and how an effective data breach response program can help mitigate the damage.
When you attend this webinar, you will:
• learn what factors cause the price of an incident to ratchet up higher and higher
• learn how much cyber insurance can (and cannot) protect you from the costs of a breach
• learn how much a good incident response team can save your organization
understand the long-term impacts a data breach can have on your organization and how to prepare for them
Darrel Rendell, Principal Intelligence Analyst, Aaron Riley, Intelligence Analyst, at Cofense
While ransomware might not be dominating the headlines, it is still a persistent threat that continues to evolve. Weaponized emails still make it past the gateway and ransomware infections happen. Today, variants of ransomware offer “customer support” offered by the cybercriminal for communication and negotiation with the victim. Ransom amounts can vary depending on the perceived wealth of the victim. Ransomware operators also offer flexible payment methods using forms of payment other than Bitcoin and even structured payment/decryption plans. As ransomware evolves, so must your response to these threats.
This session will help you understand:
- The impact of what happens if your users are not trained on email scrutiny
- The multiple effects it can have on your enterprise
- Techniques to mitigate incidents and bolster your network’s protection against future attacks
Ransomware is a vicious type of malware. Not only can it potentially destroy your data and perhaps even your hardware, it can wreak havoc on your business operations. Ultimately the question a company has to face, of course, is do you pay the ransom for the chance to recover your system or not. If you don’t pay, you potentially could lose everything. If you do pay, you potentially could still lose everything, as well as possibly break various laws. This 20/20 editorial webcast with ensuing special report takes a deeper dive into your options and why you might well face a no-win scenario. It’s the Kobayashi Maru test – do you follow the rules or make your own?
If you are implementing a security awareness program – how do you talk about it with executives? This session will review the top 5 reports that Boards and top executives need to see as you implement a program. They will demonstrate if your plan is working or if changes are needed. These stats about your program will help you plan and secure the gaps between end users and technology while communicating measurable goals.
Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Darrel Rendell, Mollie Holleman,
What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats. Organizations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Cofense believes solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defense network and feeding their real-time intelligence to security teams for immediate action.
Darrel Rendell, Principal Intelligence Analyst, Cofense
Mollie Holleman, Senior Intelligence Specialist, Cofense
Hear from Aaron Higbee and Lenny Liebmann, contributing editor with InformationWeek as they discuss the latest phishing trends, attacks and defense strategies across global enterprises and some predictions of what to expect in 2018.
John “Lex” Robinson, Anti-Phishing / Cyber Security Strategist at Cofense
We’re all bombarded by emails. Unfortunately, some are weaponized. They deliver ransomware, other malware, and social engineering scams. What happens when a phishing email gets past your security technologies and lands in employees’ inboxes?
This webinar will show you how to teach them to spot and report phishing, feed your incident response teams the intel to mitigate attacks and increase overall enterprise resiliency. Take the first step in creating a collective and collaborative defense. One that enables your team to stop email-based threats.
Adrian Davis, Director of Cybersecurity Advocacy for EMEA, (ISC)², Mollie Holleman, Senior Intelligence Specialist, Phishme
Join (ISC)² EMEA and PhishMe for a look back at 2017’s threats and a look ahead. We’ll provide an overview of what PhishMe's Intelligence team uncovered, discuss trends in phishing-delivered malware, and analyse how various delivery vectors evolved.
Some of the trends we’ll discuss:
•The implications of last year’s major global cyber-events, such as WannaCry and NotPetya
•The emergence of new ransomware families
•The abuse of legitimate functions built into business-critical software platforms to deliver malware
•The favouring of modularity and plug-in accompaniments to lightweight botnet and stealer malwares
•New ways cyber-criminals are obtaining cryptocurrency
Cyber-crime won’t slow down. Take this opportunity to learn from the recent past as you deal with current threats and prepare for whatever’s next.
Ransomware continues to be a headline grabber but where do these attacks rate compared to other cyberattacks? We look at the history of ransomware, it’s not-so-obvious impacts, and how you can prepare for the next attack in today’s 20/20 webinar.
John ‘Lex’ Robinson, Anti-Phishing / Cyber Security Strategist
Whether you’re just getting your program off the ground or looking to optimize your current program, this webinar will give you the knowledge you need. It’s based on proven programs involving over 27 million end users across 160 countries. Tune into to find out what others have done to reduce end-user susceptibility by 95% and build resiliency among their workforce.
Some of the topics covered include:
- Best ways to introduce and communicate a program
- Tips for increasing engagement
- Most important metrics your Board and C-level Execs will want to review
- How to handle repeat clickers
John ‘Lex’ Robinson, Anti-Phishing / Cyber Security Strategist
The bad news: phishing is still the #1 cyber-attack vector. The good news: new PhishMe research shows how you can go on the offensive and strengthen your resiliency to costly phishing attacks.
Join Lex Robinson, Anti-Phishing / Cyber Security Strategist, as he breaks down data from training simulations and real-life attacks to reveal how you can design a great anti-phishing program. Learn how a proactive approach conditions employees to recognize both active threats—the latest attacks that are costing organizations big-time—and “classic” threats bad actors can recycle whenever they please. See how to gain insights from incident response and phishing intelligence to keep you out in front of evolving threats. You’ll learn how to take the offensive to lower susceptibility, fortify resiliency and disrupt attacks faster.
It should come as no surprise to anyone that ransomware has become the hackers’ favored option these days. If you buy in to the scare tactics about ransomware, it’s easy to create, has a high profile in the media and can be lucrative. But like everything else in the data security world, nothing is ever as simple as it seems. This eBook (and corresponding 20/20 webcast) will look at the realities of ransomware, including the real and imagined difficulties of defending against it, the support needed on the attacker’s side to make ransomware effective and tactics victims can take to rid themselves of the malware.
Adrian Davis, Managing Director, (ISC)² EMEA, John ‘Lex’ Robinson, Marcel Feller, PhishMe
During a survey recently conducted among security professionals, 90% said phishing is the #1 threat. Yet many acknowledged they’re unprepared to deal with phishing attacks.
Attend this webinar to learn why responders are drowning in emails instead of hunting real threats. See why they’re betting on automation whilst we know, tech alone won’t stop threats from getting through and wreaking serious havoc. Learn what rapid changes and investments your peers are planning to turn the tide against phishing and protect their organisations.
You will also find out:
•How bad is the phishing threat?
•How confident are companies in their phishing responses?
•What solutions are companies using—and which ones should they add?
•How can automation and technology help? Why are humans important, too?
Josh Goldfarb, Co-founder of IDRRA; Jim Hansen, COO, PhishMe
If you’re a security professional, you understand the cyber threat to your organization and the need for an effective defense. The one big problem: your top management doesn’t. In this useful and insightful webinar, top experts offer recommendations on how to measure the cyber threat posed to your enterprise, the posture of your online defenses, and the needs and achievements of your IT security department. This webinar will bring you some new methods for describing and measuring your cybersecurity initiatives so that they can be understood by even the most business-oriented executives.
Doug Barth Principal, Founder GatePoint Research and Tim Armstrong Product Marketing, PhishMe
In early 2017, with the help of Gatepoint Research, PhishMe conducted a survey of select IT executives themed “Phishing Response Strategies”. The participants represent a wide variety of industries including business services, high tech, healthcare, financial services, and more. Survey participants were asked important questions about their current phishing response strategies’ strengths and weaknesses, as well as the current state of their phishing response programs.
Join PhishMe and Simply Direct for an in-depth review of responses to this survey and discover answers to current challenges relating to Phishing Incident Response in today’s organizations.
What are the current strategies for detecting and managing phishing attacks?
What technologies are currently deployed or in process?
What capabilities would most enhance the phishing management process?
Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. From driving awareness to security automation and orchestration, our solutions are designed to anticipate and disrupt the attack kill chain at delivery to quickly mitigate the impacts from spear phishing, ransomware, malware, and business email compromise. Today, this is all made real for thousands of global organizations. Learn more at www.cofense.com.