The bad news: phishing is still the #1 cyber-attack vector. The good news: new PhishMe research shows how you can go on the offensive and strengthen your resiliency to costly phishing attacks.
Join Lex Robinson, Anti-Phishing / Cyber Security Strategist, as he breaks down data from training simulations and real-life attacks to reveal how you can design a great anti-phishing program. Learn how a proactive approach conditions employees to recognize both active threats—the latest attacks that are costing organizations big-time—and “classic” threats bad actors can recycle whenever they please. See how to gain insights from incident response and phishing intelligence to keep you out in front of evolving threats. You’ll learn how to take the offensive to lower susceptibility, fortify resiliency and disrupt attacks faster.
RecordedNov 16 201742 mins
Your place is confirmed, we'll send you email reminders
Cofense has created the Coronavirus Phishing Infocenter to provide security and awareness teams useful tools to combat the escalating scourge of email threats preying on people's pandemic fears. The site includes the latest examples of real COVID-19 related phishing emails reported by Cofense users – all of which have evaded perimeter controls like Secure Email Gateways (SEGs).
Join Cofense Chief Technology Officer & Co-Founder, Aaron Higbee, and Cofense Security Solutions Advisor, Tonia Dudley, as they lead a 45-minute discussion on evolving Coronavirus attacks and the best ways to stop phishing threats that are getting past even the most sophisticated SEGs.
It has become cliché to say that the user is the weakest link in cybersecurity. However, it is also true that the user is often the last line of defense — phishing and other potential security attacks often depend on a person clicking on a link or malware-laden file to launch an attack. While a company might have a top notch cybersecurity operations team, without having an equally trained user base the company is essentially defending itself with one hand tied behind its virtual back.
This SC Magazine 20/20 editorial webcast looks at how CISOs can augment their professional cybersecurity team and security operations center with a highly aware user base to identify and defeat potential breaches.
Alan Rainer Senior Intelligence Specialist, Cofense Intelligence
While the fourth quarter of 2019 saw a decrease in total malware volume, Emotet (also known as Geodo) took the spotlight with email reply chains, macro-laden attachments, and convincing phishing templates. Of course, Emotet is just one of many threats currently facing organizations. Defenders need to understand both the current phishing landscape and how it may change in the future to best safeguard themselves from compromises and breaches.
Join Cofense Intelligence for expert analysis of the latest threats and a look at the tactics, techniques, and procedures attackers may use in the coming year.
You will learn:
• The top emergent threats of Q4 2019
• Changes in the phishing threat landscape
• Predictions for the rest of 2020
James Hickey, Sec. Engineer, Europe, David Mount, Sen. Dir., Solutions Marketing, Cofense, Brandon Dunlap, Moderator, (ISC)²
The threat landscape continues to evolve at a rapid pace, with new threat vectors emerging and increasing in sophistication. With the new year on the horizon, how can organisations prepare to defend against new and emerging attacks? Join James Hickey and David Mount in our webinar as they share their thoughts on what we can expect in 2020 and beyond. Based on insights collected from our research teams, our speakers will touch on trends positioned to dominate the threat landscape next year so you can strengthen your organisational defence.
Attend the webinar and learn:
• How ransomware is evolving and becoming more targeted to reap more sizeable payouts
• Why healthcare and genetic testing organisations will be a rich target for monetising data
• Why cryptocurrency will find itself in the crosshairs
• How human intuition, a powerful weapon against phishing, will also prove essential as information warfare heats up
As the phishing threat landscape continues to evolve at a pace that technology is unable to keep up with, organizations are turning to phishing awareness and simulation programs to plug the gap. Is your phishing awareness program keeping up with this changing landscape?
Join Cofense as we explore the attributes of a modern phishing awareness program and see what our data, based on millions of phishing simulations, shows about awareness programs and simulation exercises.
You will learn:
- The statistical advantage of using an email reporting tool
- The important role the end user plays in active defense
- How often you need to send simulations for maximum resiliency
- The advantages of basing simulations on active threats, not random dangers
- Why ‘phish testing’ is the enemy of true phishing defense
Joshua Bartolomie, Director, Research and Development and KJ Jagtap, Product Marketing Manager, Cofense
Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognize phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.
This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organizations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.
Join this webinar to learn about:
- The constantly changing threat landscape
- Turning active, real threats into learning moments for your users
- Speeding up response with timely, actionable intelligence
Dave Mount, Sr Director of Solutions Marketing and Mollie MacDougall, Product Manager, Cofense Intelligence
Despite investment in next-gen technologies and employee awareness training phishing threats continue to become more sophisticated and more effective. It’s time for organizations to accept that REAL phish are the REAL problem. Join the Cofense Phishing Threat Landscape review to discover the trends defining phishing in 2019 and priorities for defending your organization going forward.
Attend this webinar to learn how attackers are:
- Using major malware types and their innovative tactics, techniques, and procedures
- Intensifying credential theft as organizations move infrastructure and applications to the cloud
- Evolving Emotet and the threat actors behind the botnet
- Increasing proliferation of sextortion phishing emails
Joshua Bartolomie, Director, Research and Development, at Cofense
It’s a constant game of cat and mouse. Security teams shift tactics to stop the latest phishing techniques, and boom! Threat actors respond with another ingenious wrinkle. With phishing now the #1 cyber-security problem (according to Microsoft’s latest Security Intelligence Report), it’s imperative to keep up.
Start by attending this webinar. You’ll learn:
· Phishing themes and shifts over time
· Attacker motivations and techniques
· Threats that are bypassing the controls put in place to prevent them
· Recommendations to stem the tide and minimize impact
· Much more
Over 90% of breaches begin as phishing emails or other social engineering tactics. Don’t wait for the next attack. Register now!
Would you like to schedule a year’s worth of simulations in just a few clicks? And deliver phishing simulations without the hassle of whitelisting? The brand-new features in Cofense PhishMe™ allow you to do just that.
Cofense PhishMe was the first to pioneer phishing simulations—and now we’re changing the game with new features like Responsive Delivery and Playbooks to improve your phishing defense programs with more accurate delivery, better reporting, and easier scheduling. Join this webinar to learn how to:
- Automate your phishing program
- Make your phishing program more effective and efficient
- Condition users to detect phishing threats through exposure to real threat simulations
- Communicate program success to key stakeholders
With more than 90% of breaches attributed to successful phishing campaigns – now is the time to elevate your phishing defense program to prepare for and prevent attacks.
Joshua Bartolomie Director, Research and Development Cofense,, Stephen Lawton, SC Magazine Editor and Chief
Unfortunately, the users expect and assume that the first, second, and third lines of defense – the company’s security technology – has already stopped threats and attacks before they even get to the users’ systems.
We in the industry know this isn’t always accurate and it is exactly what we plan to address in this 20/20 webcast.
Listen is as we discuss how to teach them to recognize phishing and other potential threats that was clever enough to get past our technological best efforts.
New year. New resolutions. Every year we make the pledge to eat healthier and get more exercise. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session, you’ll hear about 10 resolutions for your phishing defense programs that will make your organization more secure.
Some of the topics covered include:
- How to empower humans to be part of the solution
- Best practices to balance automation with human intuition
- How the latest features and technologies can make your life easier
Bad News: Over a third of all phishing attacks target financial institutions.
Good News: Recent Cofense research shows that when financial companies train employees they will report phishing. In fact, a Cofense customer recently stopped an attack in 10 minutes.
But how do you know if your organization is ready for an attack? Does your company have the right tools to quickly block threats that evade perimeter defenses?
In this presentation, we discuss the current state of resiliency against phishing threats in financial services. Cofense expert Tonia Dudley shares her insights on:
- Year-over-year financial services trends and cross-industry comparisons
- Simulation response rates relative to current/active threats
- The industry’s response to active threats
- Key areas for improvement
We hear horror stories about users clicking on some malware-enabled payload and all of a sudden all of the codes for their hardware security fobs are stolen or a business email compromise (CEO fraud) attack has been launched. Unfortunately, these stories are true. Phishing and its cousins, spear phishing, vishing, smishing, pharming, and whaling are all serious security concerns, but are they cyber-Armageddon? This 20/20 editorial webcast with ensuing special report focuses on the realities of phishing and recommends defenses you can use to reduce your risk and make it a less profitable business for the attackers.
When a phishing email makes it past your next-gen perimeter defenses - and it will - what do you do next? One way is through automation, letting the latest blinky boxes take care of the threat, but are they always right? The best response is a blend of documented, repeatable procedures that includes human intuition, along with automation.
Technology alone is not enough to respond to phishing attacks. In this session, Aaron Higbee, CTO and co-founder of Cofense (formerly PhishMe) will discuss best practices on blending human intuition with automation. Tonia Dudley, Security Solution Adviser, will demonstrate how to stop phishing attacks faster with Cofense Triage.
Alexandra Wenisch, Information Security Program Manager, Cofense
A third of all breaches target healthcare companies. But while phishing defense is an industry must, new Cofense research shows that healthcare lags behind other sectors in recognizing and reporting phishing. If you're in healthcare, or any other industry for that matter, how do you know if your organization is ready for an attack?
In this presentation, we discuss the current state of healthcare's resiliency against phishing threats. Cofense expert Alexandra Wenisch shares her insights on:
- Year-over-year healthcare trends and cross-industry comparisons
- Simulation response rates relative to current/active threats
- Healthcare’s response to active threats
- Key areas for improvement
Nik Kalogirou, VP of Sales (APAC), Cofense; Ryan Jones, Sales Engineer, Cofense
What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats.
Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.
Join Cofense and (ISC)² on Oct 10, 2018 (Wed) at 13:00 (Singapore time) to hear about trends that we’ve been seeing around the globe and how they can impact the Asia-Pacific region.
Presenter: Nik Kalogirou, VP of Sales (APAC), Cofense
Presenter: Ryan Jones, Sales Engineer, Cofense
Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
A major breach of your enterprise's critical data could potentially threaten the life of your business. In addition to the potential loss of customer data or intellectual property, a breached company faces public scrutiny, IT security overhauls, potential lawsuits, brand damage, and loss of customers. In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business –and how an effective data breach response program can help mitigate the damage.
When you attend this webinar, you will:
• learn what factors cause the price of an incident to ratchet up higher and higher
• learn how much cyber insurance can (and cannot) protect you from the costs of a breach
• learn how much a good incident response team can save your organization
understand the long-term impacts a data breach can have on your organization and how to prepare for them
Darrel Rendell, Principal Intelligence Analyst, Aaron Riley, Intelligence Analyst, at Cofense
While ransomware might not be dominating the headlines, it is still a persistent threat that continues to evolve. Weaponized emails still make it past the gateway and ransomware infections happen. Today, variants of ransomware offer “customer support” offered by the cybercriminal for communication and negotiation with the victim. Ransom amounts can vary depending on the perceived wealth of the victim. Ransomware operators also offer flexible payment methods using forms of payment other than Bitcoin and even structured payment/decryption plans. As ransomware evolves, so must your response to these threats.
This session will help you understand:
- The impact of what happens if your users are not trained on email scrutiny
- The multiple effects it can have on your enterprise
- Techniques to mitigate incidents and bolster your network’s protection against future attacks
Ransomware is a vicious type of malware. Not only can it potentially destroy your data and perhaps even your hardware, it can wreak havoc on your business operations. Ultimately the question a company has to face, of course, is do you pay the ransom for the chance to recover your system or not. If you don’t pay, you potentially could lose everything. If you do pay, you potentially could still lose everything, as well as possibly break various laws. This 20/20 editorial webcast with ensuing special report takes a deeper dive into your options and why you might well face a no-win scenario. It’s the Kobayashi Maru test – do you follow the rules or make your own?
If you are implementing a security awareness program – how do you talk about it with executives? This session will review the top 5 reports that Boards and top executives need to see as you implement a program. They will demonstrate if your plan is working or if changes are needed. These stats about your program will help you plan and secure the gaps between end users and technology while communicating measurable goals.
Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. From driving awareness to security automation and orchestration, our solutions are designed to anticipate and disrupt the attack kill chain at delivery to quickly mitigate the impacts from spear phishing, ransomware, malware, and business email compromise. Today, this is all made real for thousands of global organizations. Learn more at www.cofense.com.