Automate the Detection and Response of Phishing Attacks

Logo
Presented by

Greg Foss (LogRhythm), Paul Asadoorian (Security Weekly), John Strand (Black Hills Information Security)

About this talk

Phishing campaigns are among the most common and damaging cyberattacks. Despite how common and successful phishing attacks are, often times organizations and their employees are ill-prepared to handle these threats. In this webinar, Greg Foss, LogRhythm Manager of Global Security Operations, Paul Asadoorian, Security Weekly CEO and Founder, and John Strand, Black Hills Information Security Owner and Security Analyst, discuss phishing attacks and how you can protect yourself from them. Additionally, the three go on to discuss how LogRhythm’s open-source Phishing Intelligence Engine (PIE), can help streamline and automate the entire process of tracking, analyzing, and responding to phishing emails. Watch now to learn how LogRhythm is helping to automate the detection and response to phishing attacks.

Related topics:

More from this channel

Upcoming talks (4)
On-demand talks (207)
Subscribers (68486)
LogRhythm helps busy and lean security operations teams save the day—day after day. There’s a lot riding on the shoulders of security professionals—the reputation and success of their company, the safety of citizens and organizations across the globe, the security of critical resources—the weight of protecting the world. LogRhythm helps lighten this load. The company is on the frontlines defending against many of the world’s most significant cyberattacks and empowers security teams to navigate an ever-changing threat landscape with confidence. As allies in the fight, LogRhythm combines a comprehensive and flexible security operations platform, technology partnerships, and advisory services to help SOC teams close the gaps.