Hi [[ session.user.profile.firstName ]]

How to Prevent Breaches with Phishing Threat Intelligence

Mottos like "If you see something, say something" speak to the power of human observation in preventing security disasters. Similarly, valuable human-generated intelligence can be effective in preventing data breaches emanating from phishing attacks. In today’s changing cyber threat landscape, humans need to be conditioned to recognise phishing attacks and security teams need to be armed with actionable threat intelligence to rapidly manage an attack once it hits.

This is where Phishing Threat Intelligence comes into play. By extracting key IOCs from newer phishing threats and making them available to security teams, organisations can detect attacks in progress and respond quickly to reduce the effect of a breach. Plus, by incorporating the same intelligence and tactics in your awareness program, you can train your users to more quickly detect and report an active threat.

Join this webinar to learn about:
-The constantly changing threat landscape
-Turning active, real threats into learning moments for your users
-Speeding up response with timely, actionable intelligence
Recorded Jul 23 2019 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Darrel Rendell, Principal Intelligence Analyst, Cofense, Brandon Dunlap, Moderator, (ISC)²
Presentation preview: How to Prevent Breaches with Phishing Threat Intelligence

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Security Secrets: Why Leading SOC Teams Have Cloud-y Vision Aug 18 2020 12:00 pm UTC 60 mins
    Matthias Maier, Product Marketing Director, Splunk; Brandon Dunlap, Moderator
    Security teams need to plan and prepare for a consistent security and compliance posture across a larger, more fluid ecosystem in the cloud. To cover the additional attack surface, it’s important to know all the nooks and crannies, and what operates within them. One of these operators are the App Dev teams that increasingly move toward DevOps. Code is being built and released at a level of speed and complexity that leads to high interdependencies - causing unpredictability and risk. Now more than ever, a strategy needs to balance Security Operations’ costs with the growing list of responsibilities that come as part of the package with cloud. Join Splunk and (ISC)2 on August 18, 2020 at 1:00PM BST and learn the secrets of leading security teams, including:

    •What the future of security operations centres (SOCs) and job roles will look like
    •How the SOC Team needs to be strategically embedded in DevOps
    •How to ensure and monitor compliance with an organization's security policy across multi-cloud services
    •How DevOps’ principles can be practiced in the SOC operating model
    •What it looks like to plan and establish a SOC in the cloud
    •Starting your plan and how to communicate it to management
  • The 'Hottest' IT Security Technologies in 2020 Recorded: Jul 28 2020 59 mins
    Steve Piper, CISSP, Founder & CEO, CyberEdge Group; Brandon Dunlap, Moderator
    Want to know which IT security technologies are hot and which ones are not? 2020 has thrown many purchasing and deployment plans into a state of flux and your organization has probably been caught up in this. Join Steve Piper, Founder & CEO of CyberEdge (and a proud CISSP) and (ISC)2 on Tuesday, July 28, 2020 at 1:00PM Eastern as Steve reviews key purchase insights from the 2020 Cyberthreat Defense Report. Specifically, this webcast will examine which security technologies are most widely deployed and most planned for acquisition in 2020 so you can benchmark your company’s current and planned investments against your peers. Purchase intent across five key security technology categories will be focused on including:

    •Network security
    •Endpoint security
    •Application and data security
    •Security management and operations
    •Identity and access management
  • Managing Shadow IT Realities with A Remote Workforce Recorded: Jul 28 2020 61 mins
    Scott Bridgen, GRC Consulting Director, One Trust; Brandon Dunlap, Moderator
    Business teams have been enabled by technology solutions effectively so that their reliance on centralized teams such as IT and security has decreased significantly. The cyber threat landscape continues to evolve and organizations need to be prepared to identify vulnerabilities and points for exposure, including unforeseen shadow IT applications. As businesses have been forced to adapt to new working realities, how has the shift to a remote workforce impacted businesses' ability to identify undocumented systems and vulnerabilities? Join One Trust and (ISC)2 on Thursday, July 28, 2020 at 1:00PM BST as we discuss some of the contributing factors to shadow IT, the potential impacts and risk exposure, and some best practices in protecting stakeholders across the business. We’ll also examine:

    · Key roles and responsibilities to align an effective defense in your risk management program

    · Identify processes that fuel and encourage shadow IT practices

    · Best practices to engage line of business employees to educate and promote cyber threat awareness
  • Guide to your (ISC)² Membership in EMEA: Benefits, Maintenance & Opportunities Recorded: Jul 21 2020 61 mins
    Natasha Karelina, (ISC)² Customer Service Manager, EMEA
    Join the Guide to Your (ISC)² Membership in EMEA webinar to learn more about these topics and others including:
    - CPE opportunities, member benefits and getting involved
    - Updates on (ISC)² news, developments and changes in your region
    - Your membership requirements summarized
    - Who are the (ISC)² EMEA team and how we can help you
    - Focus discussions
    - Q&A session

    Viewing this webinar for at least 45 minutes will earn you 1 group B CPE.
  • Network Visibility in a Kubernetes Environment Recorded: Jul 14 2020 63 mins
    Ollie Sheridan, Principal Sales Engineer, Security, (EMEA); Brandon Dunlap, Moderator
    IT, cloud and security architects are responsible for addressing the following questions before they can successfully deploy applications in containers with Kubernetes-based orchestration and ensure the resultant traffic is optimally processed and distributed:

    · How can I get visibility into inter-container traffic as containers are ephemeral and constantly in-motion?
    · Can I ensure scalable visibility as deployed apps grow and can span hundreds of microservices each?

    · What if the underlying network architecture changes with a different virtual switch methodology?

    · Is there a way to automate the configured policies across thousands of containers in real-time?

    Not addressing these considerations slows down the transition to container-based applications, limits the use of datacenter automation and leaves the organization vulnerable to potential security breaches, with potential impact to reputation and brand. Join Gigamon and (ISC)2 on July 14, 2020 at 1:00PM BST for answers to these and other questions as we dive into containers and network visibility.
  • From Cost-Center to Business Enabler: How Cybersecurity is Changing Recorded: Jul 13 2020 54 mins
    Jake Olcott, VP of Government Affairs and Corporate Strategies, BitSight; Brandon Dunlap, Moderator
    These unprecedented times are ushering in a new world for security and risk professionals. Many organizations have transitioned to full-time remote work and acceleration of digital initiatives while CISOs are increasingly being asked to adapt to the speed of business and demonstrate value to the organization. How can security and risk leaders adapt to the new normal? What changes must they make to their programs? How can security enable the business to succeed — moving beyond the “cost center” mindset? Join BitSight and (ISC)2 for a discussion on the changing role of the security professional, the rise of quantitative measurement and metrics, and how you should be thinking about your program and relationships with executives in the months and years ahead.
  • ECRIME PAY$! - The New Reality of Ransomware Attacks Recorded: Jul 7 2020 61 mins
    Zeki Turedi, Technology Strategist, Crowdstrike; Brandon Dunlap (Moderator)
    There’s no question that ransomware is a growing threat. In what may be the biggest attack against a commercial business in history, ZDNet reported that a European manufacturer was forced to pay around $95 million following a ransomware attack. And in a separate incident, BBC reported a large renewable energy company lost access to 22,000 computers in 40 countries, reducing its workforce to using pen and paper until the ransomware infection was resolved. However, these attacks reflect only the public side of a much larger cybercriminal industry that is constantly innovating its capabilities. In fact, ransomware is one of the fastest-growing threats in cybersecurity, with damages predicted to crest $20 billion globally by 2021, up from “only” $345 million* in 2015. Join Crowdstrike and (ISC)2 on July 7, 2020 at 1:00PM BST as we explore:

    - The increase in state-sponsored ransomware seen within the last 12 months where focused attacks promise greater financial payoffs

    - The tactics, techniques and procedures observed by today’s ransomware attackers and how they’re getting more sophisticated

    - What you can do to stop ransomware in its tracks
  • Cyber Criminals Leave Their Fingerprints on the Internet Too Recorded: Jun 23 2020 47 mins
    Oliver Tonge, Cyber Security Consultant, DomainTools; Brandon Dunlap, Moderator
    Everyone leaves breadcrumb trails on the internet, including threat actors. In a post GDPR world, DNS intelligence and analytics become ever more valuable assets for threat hunters and analysts alike. Actionable verdicts on deceitful websites and malign infrastructure along with protective monitoring mechanisms are just a few clicks away. Join DomainTools and (ISC)2 for an examination of the DomainTools threat intelligence suite - and unparalleled data repository – that can be used to profile a network of fraudulent websites. The session will include real-world investigations with practical applications of domain and infrastructure intelligence.
  • OpenSource Security Tools for Cloud Native Environments Recorded: Jun 23 2020 61 mins
    Steve Giguere, CSSLP, Senior Solution Architect, Aqua Security; Brandon Dunlap, Moderator
    Securing production workloads used to be the responsibility of information security specialists. In a DevOps culture, security becomes part of everyone's responsibility as security shifts left of boom. Join Aqua Security and (ISC)2 on June 23, 2020 at 1:00PM BST for a discussion on the cloud native threat landscape and some recent high profile attacks. We will review how security can be embedded at every stage of the CI/CD pipeline and demonstrate opensource tools that can be used to assess the security posture of your kubernetes cluster and container images.
  • Improving the Cybersecurity Value of Your DNS and IPAM System Recorded: Jun 16 2020 61 mins
    Michael Katz, Security Sales Specialist, Infoblox; Brandon Dunlap, Moderator
    Even in 2020, many organizations overlook the DNS and IP Address Management systems in their cyber security strategy. Many DNS and IPAM systems are afterthoughts in cyber policy and relegated to unmanaged freeware. This approach misses the benefits DNS and IPAM can bring to your security practice. Join Infoblox and (ISC)2 on June 16, 2020 at 1:00PM BST for a discussion that will examine concrete ideas you can implement in your organization to maximize the cyber-benefit from DNS and IPAM services.
  • Engaging End Users in Phishing Defence – Are your Teams Combat Ready? Recorded: Jun 9 2020 60 mins
    David Mount, Sr. Dir. Sales Engineering, Cofense; Andy Spencer, VP Sales Engineering, Cofense; Brandon Dunlap (Moderator)
    As the world locks down to mitigate the risks of COVID-19, many employees are still adjusting to working from home, and companies like yours are working hard to support it. However, organizations cannot completely lock down their networks. For example, phishing emails continue to evade Secure Email Gateways, with threat actors adapting their tactics to exploit the ongoing crisis. Businesses are threatened by a surge of phish related to COVID-19 and remote work. Join Cofense and (ISC)2 on June 9, 2020 at 1:00PM BST as Cofense security experts David Mount and Andy Spencer provide an in-depth review of the current phishing threat landscape, as seen through the inboxes and eyes of those on the front line – your end users, the new face of your front-line phishing defence. Highlights will include:

    · Insights of various phishing campaigns that evaded SEGs and reached enterprise end users, delivering credential phish and malware.

    · How threat actors are using trusted services, such as online business surveys and document sharing platforms, to evade SEGs.

    · Expert predictions of what we will continue to see through the end of Q2 and the remainder of 2020.
  • Continuing the Conversation: What We’ve Learned From the COVID-19 Outbreak Recorded: May 19 2020 62 mins
    John Carnes, Erik von Geldern, Kris Rosson, Brandon Dunlap, Moderator
    On April 28, 2020, (ISC)2 hosted a diverse panel of cybersecurity professionals who discussed the impact the COVID-19 pandemic has had on their IT operations and cybersecurity teams. The first webcast, in this series, generated a great deal of interest, discussion and questions from the audience. We will continue the conversation on May 19, 2020 to tackle the questions and discussions that continue to be raised during this ongoing crisis. This second webcast will be devoted to the economic impact (budgets slashed with no revenue coming in) due to the shutdown caused by COVID-19. In addition, we’ll discuss what re-opening an office may look like and how the current situation affects individuals both physically and emotionally. Join the conversation to share your thoughts and gain insight into how your team can continue to handle this changing situation.
  • TLS1.3: Two Years On Recorded: May 19 2020 62 mins
    Ollie Sheridan, Principal Sales Engineer, Security, (EMEA) Gigamon; Brandon Dunlap, Moderator
    After being released in August 2018, what does TLS1.3 look like today and how many organisations are using it? There are many claims that TLS1.3 is the one-stop-shop solution to all encryption requirements; but is that the case? Join Gigamon and (ISC)2 on May 19, 2020 at 1:00PM BST for a discussion about organisations using TLS1.3, why they are using it and why in some situations it’s not a suitable fit for encryption requirements. We'll also explore what this means for visibility in terms of decryption and for the generation of Metadata, such as IPFIX (Internet Protocol Flow Information Export) and CEF (Common Event Format). We’ll also examine:

    - Understand how many people are using TLS1.3 and why

    - See what makes TLS1.3 different to TLS1.2 and why TLS1.3 not always the best choice

    - Understand what is required to decrypt TLS1.3 in order to present decrypted traffic to Security Countermeasures

    - How Metadata fits into TLS1.3
  • Paving a Path to a Passwordless Future Recorded: May 12 2020 60 mins
    J. Wolfgang Goerlich, Advisory CISO, Duo Security; Brandon Dunlap, Moderator
    Passwords don’t have a great reputation: between user complaints of friction adhering to complex password policies and admin complaints about how frequently lost or stolen passwords pose a risk of attack, the use of passwords have few fans With these password problems and more, it raises the question: why would we still use passwords at all? Join Duo Security and (ISC)2 on May 12, 2020 at 1:00PM BST Duo Advisory CISO J. Wolfgang Goerlich provides a walkthrough of why security leaders want to move past passwords, and the challenges of a truly universal passwordless future. The session will also show how Duo Security is supporting this initiative, both championing modern authentication standards like WebAuthn and building partnerships with industry leaders including Microsoft to reduce reliance on passwords.
  • CISO Says With Kevin Fielder, Chief Information Security Officer at Just Eat Recorded: May 5 2020 60 mins
    Kevin Fielder, CISO, Just Eat, Brandon Dunlap, Moderator, (ISC)²
    In the CISO Says Series, information security leaders share their experiences of what it means to be responsible for establishing and maintaining an enterprise's security vision and strategy in an interview format.

    In this session Kevin Fielder, CISO at the Just Eat will provide insight into the path he took to become a Cybersecurity Leader and how he is reinventing the role in the face of accelerating change.
  • Gamechanger! What We’ve Learned (So Far) from the COVID-19 Outbreak Recorded: Apr 28 2020 62 mins
    John Carnes, Erik von Geldern, Kris Rosson, Brandon Dunlap, Moderator
    The world seemingly changed overnight. Offices and business shut down. Stay-at-home orders. A remote workforce appearing out of nowhere needing equipment and support. Cybersecurity professionals are facing challenges and situations none would have dreamed about even 90 days ago. Join (ISC)2 on Tuesday, April 28, 2020 at 1:00PM Eastern for a panel discussion examining what security practitioners are experiencing during the COVID-19 health crisis. The webcast will include results from an (ISC)2 pulse survey that asked cybersecurity professionals to share how their jobs have been impacted, issues faced securing a "work from home" workforce and more. Panelists will share the challenges they face, what lessons have been learned and the “sliver-lining” they may have discovered as they and their teams jumped into the unknown and transformed their operations in response.
  • Minimizing Security Impacts of a Growing Remote Workforce Recorded: Apr 28 2020 61 mins
    Karl Lankford, Director of Solutions Engineering, EMEIA, BeyondTrust; Brandon Dunlap, Moderator
    Many organisations are implementing remote working policies and need to quickly support an unprecedented increase in the number of remote employees. However, an expanding remote workforce can significantly increase the attack surface and has changed the threat model of organisations overnight. Many remote access options are quick to implement but are not secure and organisations are trying to navigate the challenges of quickly, but securely, operationalising their remote employees. On April 28, 2020 at 1:00PM BST, BeyondTrust and (ISC)2 will explore the risks unsecure remote access presents and discuss how the secure remote access and endpoint privilege management pillars of a PAM solution can securely and efficiently connect remote employees to corporate resources.
  • Identify, Classify, and Protect Corporate Crown Jewels with Discovery-in-Depth Recorded: Apr 21 2020 59 mins
    Roger Hale, CSO, BigID; Brandon Dunlap, Moderator.
    With recent data protection regulations and an increase in breaches, companies need to be able to not only find the Crown Jewels in their data, but also secure it. Traditional data discovery tools, however, lack the data source coverage to give organizations a way to identify and contextualize the sensitive Crown Jewels across any data store, any pipeline – in a data center or in the cloud. Join BigID and (ISC)2 on April 21, 2020 at 1:00PM GMT as we discuss how deeper data intelligence can help identify Crown Jewels and reduce liability risk across data sources. We’ll look at how to leverage next-generation classification to better enforce policy, how to reduce risk on your most valuable data, and how to implement advanced ML techniques to get more insight into your data.
  • Office Shutdown: Securing an Increased Remote Workforce Recorded: Apr 16 2020 64 mins
    John Smith, ExtraHop; Glenn Leifheit, Microsoft; Tim Campo, (ISC)2; Diane Brown, Ulta; Brandon Dunlap (Moderator)
    The COVID-19 virus outbreak has put immense pressure on IT organizations who now need to scale remote access quickly to thousands of users working from home. Many organizations did not have a plan in place for this and are doing the best they can. Many remote workers haven’t been issued laptops or are using unmanaged devices that may not have adequate protections. Some companies are running into licensing issues for things like their VPN connections. Join ExtraHop and (ISC)2 on April 16, 2020 at 1:00PM Eastern for a timely discussion on how you can deal with performance and security implications of this shift and receive tips and best practices on how to deal with the situation we find ourselves in.
  • Key Attributes of a Modern Phishing Awareness Program Recorded: Apr 15 2020 62 mins
    David Mount, Senior Director, Solutions Marketing, Cofense, Brandon Dunlap, Moderator, (ISC)²
    As the phishing threat landscape continues to evolve at a pace that technology is unable to keep up with, organisations are turning to phishing awareness and simulation programs to plug the gap. Is your phishing awareness program keeping up with this changing landscape?

    Join Cofense as we explore the attributes of a modern phishing awareness program and see what our data, based on millions of phishing simulations, shows about awareness programs and simulation exercises.

    You will learn:
    -The statistical advantage of using an email reporting tool
    -The important role the end user plays in active defense
    -How often you need to send simulations for maximum resiliency
    -The advantages of basing simulations on active threats, not random dangers
    -Why ‘phish testing’ is the enemy of true phishing defense
(ISC)² Secure Webinars - EMEA
Forming part of the (ISC)² commitment to Inspiring a Safe and Secure Cyber World, we welcome you to the (ISC)² Secure Webinars - EMEA Channel. Sign up to join us for educational Security Briefings, Roundtables and eSummits aimed at all those vested in the world of information security. We welcome members and non members alike.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to Prevent Breaches with Phishing Threat Intelligence
  • Live at: Jul 23 2019 12:00 pm
  • Presented by: Darrel Rendell, Principal Intelligence Analyst, Cofense, Brandon Dunlap, Moderator, (ISC)²
  • From:
Your email has been sent.
or close