Greg Maudsley, Senior Director Product Marketing, Menlo Security
Phishing is serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.
Join this webinar to learn:
· New phishing prevention techniques
· How to stop ransomware, malware and drive-by-exploits enabled by email phishing
· Updated security research findings
· Real-life case studies for using isolation techniques to prevent phishing attacks
Greg Maudsley has over 15 years of IT security experience and is responsible for strategy development and threat isolation innovations at Menlo Security. Previously, Maudsley was a product marketing leader for F5 and Juniper Networks' Junos Pulse Business Unit. His responsibilities spanned the security spectrum, including application security, anti-fraud, cloud security, DDoS prevention, DNS sec, secure access, NAC, mobile security, application delivery and WAN Optimization. Maudsley holds an MBA from Santa Clara University Leavey School of Business, and a B.S. in Physics from the University of Redlands.
Jason Steer, Solutions Architect, EMEA, Menlo Security Inc. & Josh Downs, Community Manager, BrightTALK
- Infosecurity Europe 2016 -
BrightTALK got the chance to catch up with community favourite Jason Steer from Menlo Security for his views on the industry and the current threat landscape.
Jason gave his thoughts on the influence that a potential Brexit could have on UK Cyber Security; information security in the financial sector and how the banks can better protect themselves from threat actors; ransomare and the associated dangers; how to protect yourself from malware; defending the IoT and cyber warfare globally. Lots of topics covered, lots of insights to take away.
CTO and co-founder Kowsik Guruswamy introduces the Menlo Security Isolation Platform. This solution protects organizations from cyber attacks by isolating and executing all active Web content – sites, links, documents, etc. – in the public or private cloud, rather than at the endpoint, eliminating malware before it can penetrate your network and reach user devices.
The latest on using isolation to eliminate malware from Web and email
Security experts present engaging technical discussions and case studies highlighting isolation technology and how it eliminates malware from Web and email. Aimed at security professionals in both technical and management roles.