The bad news: phishing is still the #1 cyber-attack vector. The good news: new PhishMe research shows how you can go on the offensive and strengthen your resiliency to costly phishing attacks.
Join Lex Robinson, Anti-Phishing / Cyber Security Strategist, as he breaks down data from training simulations and real-life attacks to reveal how you can design a great anti-phishing program. Learn how a proactive approach conditions employees to recognize both active threats—the latest attacks that are costing organizations big-time—and “classic” threats bad actors can recycle whenever they please. See how to gain insights from incident response and phishing intelligence to keep you out in front of evolving threats. You’ll learn how to take the offensive to lower susceptibility, fortify resiliency and disrupt attacks faster.
RecordedNov 16 201742 mins
Your place is confirmed, we'll send you email reminders
Joshua Bartolomie, Director, Research and Development and KJ Jagtap, Product Marketing Manager, Cofense
Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognize phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.
This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organizations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.
Join this webinar to learn about:
- The constantly changing threat landscape
- Turning active, real threats into learning moments for your users
- Speeding up response with timely, actionable intelligence
Dave Mount, Sr Director of Solutions Marketing and Mollie MacDougall, Product Manager, Cofense Intelligence
Despite investment in next-gen technologies and employee awareness training phishing threats continue to become more sophisticated and more effective. It’s time for organizations to accept that REAL phish are the REAL problem. Join the Cofense Phishing Threat Landscape review to discover the trends defining phishing in 2019 and priorities for defending your organization going forward.
Attend this webinar to learn how attackers are:
- Using major malware types and their innovative tactics, techniques, and procedures
- Intensifying credential theft as organizations move infrastructure and applications to the cloud
- Evolving Emotet and the threat actors behind the botnet
- Increasing proliferation of sextortion phishing emails
Joshua Bartolomie, Director, Research and Development, at Cofense
It’s a constant game of cat and mouse. Security teams shift tactics to stop the latest phishing techniques, and boom! Threat actors respond with another ingenious wrinkle. With phishing now the #1 cyber-security problem (according to Microsoft’s latest Security Intelligence Report), it’s imperative to keep up.
Start by attending this webinar. You’ll learn:
· Phishing themes and shifts over time
· Attacker motivations and techniques
· Threats that are bypassing the controls put in place to prevent them
· Recommendations to stem the tide and minimize impact
· Much more
Over 90% of breaches begin as phishing emails or other social engineering tactics. Don’t wait for the next attack. Register now!
Would you like to schedule a year’s worth of simulations in just a few clicks? And deliver phishing simulations without the hassle of whitelisting? The brand-new features in Cofense PhishMe™ allow you to do just that.
Cofense PhishMe was the first to pioneer phishing simulations—and now we’re changing the game with new features like Responsive Delivery and Playbooks to improve your phishing defense programs with more accurate delivery, better reporting, and easier scheduling. Join this webinar to learn how to:
- Automate your phishing program
- Make your phishing program more effective and efficient
- Condition users to detect phishing threats through exposure to real threat simulations
- Communicate program success to key stakeholders
With more than 90% of breaches attributed to successful phishing campaigns – now is the time to elevate your phishing defense program to prepare for and prevent attacks.
New year. New resolutions. Every year we make the pledge to eat healthier and get more exercise. What is good for the waistline is also good for your phishing defense posture. With more than 90% of breaches attributed to successful phishing campaigns – now is the time to think about how to prepare and prevent attacks. In this session, you’ll hear about 10 resolutions for your phishing defense programs that will make your organization more secure.
Some of the topics covered include:
- How to empower humans to be part of the solution
- Best practices to balance automation with human intuition
- How the latest features and technologies can make your life easier
Bad News: Over a third of all phishing attacks target financial institutions.
Good News: Recent Cofense research shows that when financial companies train employees they will report phishing. In fact, a Cofense customer recently stopped an attack in 10 minutes.
But how do you know if your organization is ready for an attack? Does your company have the right tools to quickly block threats that evade perimeter defenses?
In this presentation, we discuss the current state of resiliency against phishing threats in financial services. Cofense expert Tonia Dudley shares her insights on:
- Year-over-year financial services trends and cross-industry comparisons
- Simulation response rates relative to current/active threats
- The industry’s response to active threats
- Key areas for improvement
We hear horror stories about users clicking on some malware-enabled payload and all of a sudden all of the codes for their hardware security fobs are stolen or a business email compromise (CEO fraud) attack has been launched. Unfortunately, these stories are true. Phishing and its cousins, spear phishing, vishing, smishing, pharming, and whaling are all serious security concerns, but are they cyber-Armageddon? This 20/20 editorial webcast with ensuing special report focuses on the realities of phishing and recommends defenses you can use to reduce your risk and make it a less profitable business for the attackers.
When a phishing email makes it past your next-gen perimeter defenses - and it will - what do you do next? One way is through automation, letting the latest blinky boxes take care of the threat, but are they always right? The best response is a blend of documented, repeatable procedures that includes human intuition, along with automation.
Technology alone is not enough to respond to phishing attacks. In this session, Aaron Higbee, CTO and co-founder of Cofense (formerly PhishMe) will discuss best practices on blending human intuition with automation. Tonia Dudley, Security Solution Adviser, will demonstrate how to stop phishing attacks faster with Cofense Triage.
Alexandra Wenisch, Information Security Program Manager, Cofense
A third of all breaches target healthcare companies. But while phishing defense is an industry must, new Cofense research shows that healthcare lags behind other sectors in recognizing and reporting phishing. If you're in healthcare, or any other industry for that matter, how do you know if your organization is ready for an attack?
In this presentation, we discuss the current state of healthcare's resiliency against phishing threats. Cofense expert Alexandra Wenisch shares her insights on:
- Year-over-year healthcare trends and cross-industry comparisons
- Simulation response rates relative to current/active threats
- Healthcare’s response to active threats
- Key areas for improvement
Nik Kalogirou, VP of Sales (APAC), Cofense; Ryan Jones, Sales Engineer, Cofense
What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats.
Organisations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defence network and feeding their real-time intelligence to security teams for immediate action.
Join Cofense and (ISC)² on Oct 10, 2018 (Wed) at 13:00 (Singapore time) to hear about trends that we’ve been seeing around the globe and how they can impact the Asia-Pacific region.
Presenter: Nik Kalogirou, VP of Sales (APAC), Cofense
Presenter: Ryan Jones, Sales Engineer, Cofense
Moderator: Kawin Boonyapredee, CISSP, Executive Security Advisor, IBM Security
A major breach of your enterprise's critical data could potentially threaten the life of your business. In addition to the potential loss of customer data or intellectual property, a breached company faces public scrutiny, IT security overhauls, potential lawsuits, brand damage, and loss of customers. In this webcast, experts discuss the real losses associated with a breach, both in the data center and in the business –and how an effective data breach response program can help mitigate the damage.
When you attend this webinar, you will:
• learn what factors cause the price of an incident to ratchet up higher and higher
• learn how much cyber insurance can (and cannot) protect you from the costs of a breach
• learn how much a good incident response team can save your organization
understand the long-term impacts a data breach can have on your organization and how to prepare for them
Darrel Rendell, Principal Intelligence Analyst, Aaron Riley, Intelligence Analyst, at Cofense
While ransomware might not be dominating the headlines, it is still a persistent threat that continues to evolve. Weaponized emails still make it past the gateway and ransomware infections happen. Today, variants of ransomware offer “customer support” offered by the cybercriminal for communication and negotiation with the victim. Ransom amounts can vary depending on the perceived wealth of the victim. Ransomware operators also offer flexible payment methods using forms of payment other than Bitcoin and even structured payment/decryption plans. As ransomware evolves, so must your response to these threats.
This session will help you understand:
- The impact of what happens if your users are not trained on email scrutiny
- The multiple effects it can have on your enterprise
- Techniques to mitigate incidents and bolster your network’s protection against future attacks
Ransomware is a vicious type of malware. Not only can it potentially destroy your data and perhaps even your hardware, it can wreak havoc on your business operations. Ultimately the question a company has to face, of course, is do you pay the ransom for the chance to recover your system or not. If you don’t pay, you potentially could lose everything. If you do pay, you potentially could still lose everything, as well as possibly break various laws. This 20/20 editorial webcast with ensuing special report takes a deeper dive into your options and why you might well face a no-win scenario. It’s the Kobayashi Maru test – do you follow the rules or make your own?
If you are implementing a security awareness program – how do you talk about it with executives? This session will review the top 5 reports that Boards and top executives need to see as you implement a program. They will demonstrate if your plan is working or if changes are needed. These stats about your program will help you plan and secure the gaps between end users and technology while communicating measurable goals.
Lindsay Drabwell, Head of Membership Services EMEA, (ISC)², Darrel Rendell, Mollie Holleman,
What’s keeping you up at night? Ransomware? Phishing? Spyware? Malware? Data Breaches? A malicious email typically opens the door to those threats. Organizations spend great energy (and budget) preventing users from falling prey, but threat actors continue to find ways to get past automated controls, staying one step ahead of artificial intelligence tools. Cofense believes solving the phishing problem is more than just awareness: it’s about empowering humans to become instinctual nodes on the cyber defense network and feeding their real-time intelligence to security teams for immediate action.
Darrel Rendell, Principal Intelligence Analyst, Cofense
Mollie Holleman, Senior Intelligence Specialist, Cofense
Hear from Aaron Higbee and Lenny Liebmann, contributing editor with InformationWeek as they discuss the latest phishing trends, attacks and defense strategies across global enterprises and some predictions of what to expect in 2018.
John “Lex” Robinson, Anti-Phishing / Cyber Security Strategist at Cofense
We’re all bombarded by emails. Unfortunately, some are weaponized. They deliver ransomware, other malware, and social engineering scams. What happens when a phishing email gets past your security technologies and lands in employees’ inboxes?
This webinar will show you how to teach them to spot and report phishing, feed your incident response teams the intel to mitigate attacks and increase overall enterprise resiliency. Take the first step in creating a collective and collaborative defense. One that enables your team to stop email-based threats.
Adrian Davis, Director of Cybersecurity Advocacy for EMEA, (ISC)², Mollie Holleman, Senior Intelligence Specialist, Phishme
Join (ISC)² EMEA and PhishMe for a look back at 2017’s threats and a look ahead. We’ll provide an overview of what PhishMe's Intelligence team uncovered, discuss trends in phishing-delivered malware, and analyse how various delivery vectors evolved.
Some of the trends we’ll discuss:
•The implications of last year’s major global cyber-events, such as WannaCry and NotPetya
•The emergence of new ransomware families
•The abuse of legitimate functions built into business-critical software platforms to deliver malware
•The favouring of modularity and plug-in accompaniments to lightweight botnet and stealer malwares
•New ways cyber-criminals are obtaining cryptocurrency
Cyber-crime won’t slow down. Take this opportunity to learn from the recent past as you deal with current threats and prepare for whatever’s next.
Ransomware continues to be a headline grabber but where do these attacks rate compared to other cyberattacks? We look at the history of ransomware, it’s not-so-obvious impacts, and how you can prepare for the next attack in today’s 20/20 webinar.
John ‘Lex’ Robinson, Anti-Phishing / Cyber Security Strategist
Whether you’re just getting your program off the ground or looking to optimize your current program, this webinar will give you the knowledge you need. It’s based on proven programs involving over 27 million end users across 160 countries. Tune into to find out what others have done to reduce end-user susceptibility by 95% and build resiliency among their workforce.
Some of the topics covered include:
- Best ways to introduce and communicate a program
- Tips for increasing engagement
- Most important metrics your Board and C-level Execs will want to review
- How to handle repeat clickers
Cofense, formerly PhishMe, is the leading provider of human-driven phishing defense solutions worldwide. We deliver a collaborative approach to cybersecurity by enabling organization-wide engagement to active email threats. Our collective defense suite combines best-in class incident response technologies with timely attack intelligence sourced from employees. From driving awareness to security automation and orchestration, our solutions are designed to anticipate and disrupt the attack kill chain at delivery to quickly mitigate the impacts from spear phishing, ransomware, malware, and business email compromise. Today, this is all made real for thousands of global organizations. Learn more at www.cofense.com.