Hi [[ session.user.profile.firstName ]]

Caught in the Net: Effective Defence Against Phishing Attacks

Phishing is serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.

Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

Join this webinar to learn:
· New phishing prevention techniques
· How to stop ransomware, malware and drive-by-exploits enabled by email phishing
· Updated security research findings
· Real-life case studies for using isolation techniques to prevent phishing attacks

Speaker Bio:
Greg Maudsley has over 15 years of IT security experience and is responsible for strategy development and threat isolation innovations at Menlo Security. Previously, Maudsley was a product marketing leader for F5 and Juniper Networks' Junos Pulse Business Unit. His responsibilities spanned the security spectrum, including application security, anti-fraud, cloud security, DDoS prevention, DNS sec, secure access, NAC, mobile security, application delivery and WAN Optimization. Maudsley holds an MBA from Santa Clara University Leavey School of Business, and a B.S. in Physics from the University of Redlands.
Recorded Dec 7 2016 56 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Greg Maudsley, Senior Director Product Marketing, Menlo Security
Presentation preview: Caught in the Net: Effective Defence Against Phishing Attacks

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • [APAC] How to Stay One Step Ahead of Phishing Attacks Nov 13 2019 2:00 am UTC 55 mins
    Menlo Security
    How Are You Staying Ahead?

    Phishing is a serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    In This Webinar You Will Learn:

    - New phishing prevention techniques
    - How to stop ransomware, malware, and drive-by-exploits enabled by email phishing
    - Updated security research findings
    - Real-life case studies for using isolation techniques to prevent phishing attacks
  • Guide to Eliminating the Top 3 Security Pain Points Nov 6 2019 6:00 pm UTC 49 mins
    Kowsik Guruswamy, CTO - Menlo Security & Fernando Montenegro, Principal Analyst - 451 Research
    When it comes to dealing with cyberattacks, 61% of IT professionals are not satisfied with the de facto cybersecurity protection method of after-the-fact investigations. Does this frustration sound familiar?

    The top three IT pain points have not been alleviated with this method. Users continue to click phishing links, IT teams don’t trust their end users, and there is still a distinct lack of cybersecurity experts. In addition, the typical answer to a data breach or ransomware attack is still reimaging the infected machine, causing worlds of pain for everyone involved.

    Data collected by 451 Research reflects a growing and commonly accepted trend: Phishing and staff shortages are the norm, and your budget isn’t factoring in the cost of an attack.

    Thankfully, approaches such as isolation can be an efficient way of tackling key areas of concern for security teams.

    In this webinar, experts from Menlo Security and 451 Research will discuss:

    - How customer surveys indicate current IT pain points
    - The industry’s biggest projects
    - Why isolation-based solutions are seeing an increase in customer spending
  • [APAC] A Closer Look at Isolation: Hype or Next Gen Security? Oct 31 2019 2:30 am UTC 55 mins
    Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute
    This webinar looks at Isolation from different viewpoints. Learn from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

    In This Webinar Will Dive Into:

    - The shortcomings of today’s reactive security philosophy
    - Why the web continues to present a risk to businesses
    - The benefits of embracing Isolation
    - How organizations should rethink their security strategy moving forward
  • How Internet Isolation Eliminates Threats that Evade Sandboxes Oct 29 2019 5:00 pm UTC 57 mins
    Vinay Pidathala, Director of Security Research - Menlo Security
    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. Sandboxes observe machine behavior and any deviation from the norm is flagged as suspicious and blocked. On the other hand, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. So as attackers improve their evasion techniques, how do you prevent and protect your business?

    In this webinar, Vinay Pidathala, Director of Security Research at Menlo Security, will discuss the techniques actively being used by attackers to evade sandboxes. He will also share how Internet Isolation defends against these by helping companies achieve a Zero Trust Internet.

    Discover:

    - How attackers bypass sandboxes and what is the best way to thwart these attacks
    - Real life examples of sandbox failures and how Internet Isolation protected against attacks
    - Why Internet Isolation is critical to a modern security architecture
  • Why You Should Have Zero Trust in the Web Recorded: Oct 16 2019 38 mins
    Menlo Security
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • [APAC] Guide to Eliminating the Top 3 Security Pain Points Recorded: Oct 15 2019 49 mins
    Kowsik Guruswamy, CTO - Menlo Security & Fernando Montenegro, Principal Analyst - 451 Research
    When it comes to dealing with cyberattacks, 61% of IT professionals are not satisfied with the de facto cybersecurity protection method of after-the-fact investigations. Does this frustration sound familiar?

    The top three IT pain points have not been alleviated with this method. Users continue to click phishing links, IT teams don’t trust their end users, and there is still a distinct lack of cybersecurity experts. In addition, the typical answer to a data breach or ransomware attack is still reimaging the infected machine, causing worlds of pain for everyone involved.

    Data collected by 451 Research reflects a growing and commonly accepted trend: Phishing and staff shortages are the norm, and your budget isn’t factoring in the cost of an attack.

    Thankfully, approaches such as isolation can be an efficient way of tackling key areas of concern for security teams.

    In this webinar, experts from Menlo Security and 451 Research will discuss:

    - How customer surveys indicate current IT pain points
    - The industry’s biggest projects
    - Why isolation-based solutions are seeing an increase in customer spending
  • [APAC] Is the Cloud Transforming Security? Recorded: Oct 3 2019 36 mins
    Tim Olson, VP Engineering & Andy Anchev, Director, Product Management - Menlo Security
    Everyone is moving to the cloud. It’s faster, scalable, seamless, agile, and less costly. Securing your infrastructure in the cloud, however, doesn’t cut down on time spent protecting applications, workloads, and data. You still need people to process alerts and manage a security solution.

    Given this paradigm, we’ve put together a webinar so you can hear from security experts as they share insights on why every business should focus on transforming their security to support their cloud transformation journey, and learn how remote browser isolation can help.

    We will share:

    - How IT teams are adopting a “Cloud First” attitude and how security should be part of this movement.

    - Why isolation is a fundamentally different approach that is transforming enterprise security architecture.

    - How core differences enable us to deliver isolation from the cloud.
  • [APAC] Combat Phishing: How to Turn Links Into Read Only Recorded: Sep 26 2019 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • Is the Cloud Transforming Security? Recorded: Sep 18 2019 36 mins
    Tim Olson, VP Engineering & Andy Anchev, Director, Product Management - Menlo Security
    Everyone is moving to the cloud. It’s faster, scalable, seamless, agile, and less costly. Securing your infrastructure in the cloud, however, doesn’t cut down on time spent protecting applications, workloads, and data. You still need people to process alerts and manage a security solution.

    Given this paradigm, we’ve put together a webinar so you can hear from security experts as they share insights on why every business should focus on transforming their security to support their cloud transformation journey, and learn how remote browser isolation can help.

    We will share:

    - How IT teams are adopting a “Cloud First” attitude and how security should be part of this movement.

    - Why isolation is a fundamentally different approach that is transforming enterprise security architecture.

    - How core differences enable us to deliver isolation from the cloud.
  • [APAC] Why You Should Have Zero Trust in the Web Recorded: Sep 11 2019 38 mins
    Menlo Security
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • How to Stay One Step Ahead of Phishing Attacks Recorded: Sep 5 2019 55 mins
    Menlo Security
    How Are You Staying Ahead?

    Phishing is a serious business. It is the most common targeted method of cyber attacks, and the main perpetrators for phishing attacks are organized crime syndicates and state-affiliated actors.* Despite multiple security defense layers and many hours and dollars spent on end-user training, phishing continues to create headaches for security administrators.

    In This Webinar You Will Learn:

    - New phishing prevention techniques
    - How to stop ransomware, malware, and drive-by-exploits enabled by email phishing
    - Updated security research findings
    - Real-life case studies for using isolation techniques to prevent phishing attacks
  • [EMEA] How to Turn Your Phishing Links Into Read Only Recorded: Sep 3 2019 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:

    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • A Closer Look at Isolation: Hype or Next Gen Security? Recorded: Aug 28 2019 55 mins
    Kowsik Guruswamy, CTO - Menlo Security & John Pescatore, Director of Emerging Technologies - SANS Institute
    This webinar looks at Isolation from different viewpoints. Learn from a Menlo Security customer, along with John Pescatore, Director of Emerging Technologies at SANS Institute, and Kowsik Guruswamy, Menlo Security CTO, as they explore why organizations around the globe are looking at isolation as the means to protect their users from the ever-present web and email dangers.

    In This Webinar Will Dive Into:

    - The shortcomings of today’s reactive security philosophy
    - Why the web continues to present a risk to businesses
    - The benefits of embracing Isolation
    - How organizations should rethink their security strategy moving forward
  • [EMEA] How Isolation Helps SOC Analysts Threat Hunt Recorded: Aug 28 2019 29 mins
    Patrick Darrow, Product Management Team - Menlo Security
    Security Operations Centers are a crucial aspect of ensuring data security. However, managing a Security Operations Center (SOC) can be burdensome for any IT team. The job continues to be complicated, and companies face a challenge to obtain talent that can help. Vendors are claiming to make the time to hunt more productive, typically by applying some level of intelligence to the alerts process. Does this work?

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become a significant line item in IT budgets around the world and now can help SOC teams replay attacks like never before, providing them with the insight and evidence of a breach.

    Listen to this webinar to:

    - Understand how things are done today with detection-based solutions
    - Where SOC analysts spend time during the process of Threat Hunting
    - How Isolation remove threats and can replay a real-world attack for forensic purposes

    To see how Isolation helps SOC analysts threat hunt, register now.
  • Why Browser Isolation is the New 'Sandbox' Recorded: Aug 22 2019 51 mins
    Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
    Protecting organizations from Web threats has typically been done with a proxy or DNS solution but a new approach has emerged. Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become an important line item in IT budgets around the world.

    But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Learn:

    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution

    Featuring SC Media and Lennart van den Ende, VP of Worldwide Sales Engineering - Menlo Security
  • [EMEA] Why You Should Have Zero Trust in the Web Recorded: Aug 15 2019 38 mins
    Menlo Security
    "Trusted” Websites Are Not as Safe as First Thought!

    Today, attackers leverage the web’s ubiquity and users’ trust to infect devices and propagate malware. Website categorization has been compromised. Phishing and spear-phishing attacks drive today’s most significant data breaches, and clicking on apparently legitimate links within phishing emails exposes users to credential theft or malware infections, and possibly ransomware. “Trusted” websites are not as safe as first thought, and the list goes on.

    Whether users are accessing it for business or pleasure, the Internet today is no longer a place that can be trusted.

    Watch this webinar to learn how you can protect your users and lower your odds of a web-borne, companywide cyberattack.

    Discover:

    - Why the internet remains a dangerous place
    - Best practices for lowering the odds of a cyberattack
    - Newer technologies that are solving this problem
  • Combat Phishing: How to Turn Links Into Read Only Recorded: Aug 14 2019 53 mins
    Jonathan Lee, Sr. Product Manager - Menlo Security
    99% of security breaches are initiated through email and webmail attacks. Thus, proving prevention obviously fails, and detection and response are far from guaranteed. So why try the same old failed security approaches?

    It’s time to try something that’s transforming email security—isolation. Isolation doesn’t block threats—it eliminates.

    In this webcast, attendees will learn:
    -How to combat users who are re-offenders when it comes to clicking unsafe email links and attachments
    -Need an additional layer other than a sandbox waiting for patient zero
    -The ease of deploying isolation without interfering with user experience in 10 minutes

    Save your seat to see how Isolation can help you eliminate malware and improve productivity of your employees.
  • How Isolation Helps SOC Analysts Threat Hunt Recorded: Aug 6 2019 29 mins
    Patrick Darrow, Product Management Team - Menlo Security
    Security Operations Centers are a crucial aspect of ensuring data security. On the other hand, managing a Security Operations Center (SOC) can be burdensome for any IT team. The job continues to be complicated, and companies face a challenge to obtain talent that can help. Vendors are claiming to make the time to hunt more productive, typically by applying some level of intelligence to the alerts process. However, does this work?

    Identified by Gartner as "one of the single most significant ways to reduce web-based attacks," remote browser isolation has become a significant line item in IT budgets around the world and now can help SOC teams replay attacks like never before, providing them with the insight and evidence of a breach.

    Listen to this webinar to:

    - Understand how things are done today with detection-based solutions
    - Where SOC analysts spend time during the process of Threat Hunting
    - How Isolation remove threats and can replay a real-world attack for forensic purposes

    To see how Isolation helps SOC analysts threat hunt, save your seat now.
  • How Internet Isolation Eliminates Threats that Evade Sandboxes Recorded: Jul 16 2019 58 mins
    Vinay Pidathala, Director of Security Research - Menlo Security
    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. Sandboxes observe machine behavior and any deviation from the norm is flagged as suspicious and blocked. On the other hand, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. So as attackers improve their evasion techniques, how do you prevent and protect your business?

    In this webinar, Vinay Pidathala, Director of Security Research at Menlo Security, will discuss the techniques actively being used by attackers to evade sandboxes. He will also share how Internet Isolation defends against these by helping companies achieve a Zero Trust Internet.

    Discover:

    - How attackers bypass sandboxes and what is the best way to thwart these attacks
    - Real life examples of sandbox failures and how Internet Isolation protected against attacks
    - Why Internet Isolation is critical to a modern security architecture
  • [EMEA] Is browser isolation the new ‘sandbox’ for security? Recorded: Jun 25 2019 49 mins
    Brett Raybould, Solutions Architect, Menlo Security
    Protecting organisations from web threats has typically been done with a proxy or DNS solution, but a new approach has emerged.

    Isolation defends against today’s sophisticated zero-day exploits using an “air-gapped” browsing approach.

    Identified by Gartner as “one of the single most significant ways to reduce web-based attacks,” remote browser isolation has become an important line item in IT budgets around the world. But not all Isolation is created equal. With so many offerings how do you weed through the noise?

    Join us and Menlo Security to learn:
    - Why remote browser isolation technology adoption is on the rise
    - Key use cases for Isolation that should be evaluated
    - 3 critical requirements when selecting a practical browser isolation solution
Detection Isn't Protection. ISOLATE.
Menlo Security protects organizations from cyberattacks by eliminating the threat of malware from the web, documents, and email. Menlo Security has helped
hundreds of Global 2000 companies and major government agencies achieve Zero Trust Internet. The company’s cloud-based Internet Isolation Platform scales to provide comprehensive protection across enterprises of any size, without requiring endpoint software or impacting the end-user experience. The company was named a Visionary in the Gartner Magic Quadrant for the Secure Web Gateway. The company is headquartered in Menlo Park, California. For more information, visit http://www.menlosecurity.com or @menlosecurity.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Caught in the Net: Effective Defence Against Phishing Attacks
  • Live at: Dec 7 2016 1:00 pm
  • Presented by: Greg Maudsley, Senior Director Product Marketing, Menlo Security
  • From:
Your email has been sent.
or close