Hi [[ session.user.profile.firstName ]]

Social Engineering - Are you the weakest link?

Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
Recorded Aug 30 2016 57 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Greg Iddon, Technologist, Sophos
Presentation preview: Social Engineering - Are you the weakest link?

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Social Engineering - Are you the weakest link? Recorded: Oct 27 2016 60 mins
    Greg Iddon, Technologist, Sophos
    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
  • Ransomware - To pay or not to pay? Recorded: Oct 25 2016 60 mins
    Peter Mackenzie, Malware Escalations Manager, Sophos
    Flying spiders, snakes, and ghosts are long gone. Ransomware is now the stuff of nightmares and it’s easy to see why.

    Ransomware has become one of the most widespread and damaging threats internet users now face. Since the infamous CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and Exploit Kits, extorting money from home users and businesses alike.

    Join Sophos ransomware pro, Peter Mackenzie, as he shows us how ransomware attacks work, explains why so many new infections keep surfacing, and what practical precautions you can take to protect your organisation.

    If this webinar doesn’t help an IT Hero sleep at night, we don’t know what will.
  • Stopping Targeted Attacks with Sandbox Technology Recorded: Sep 8 2016 44 mins
    Peter Craig, Senior Product Specialist, Sophos.
    Targeted threats using zero-day malware embedded in file downloads and email attachments are increasingly used to attack organizations like yours. Unfortunately these bleeding-edge attacks are often undetectable by traditional anti-virus engines.

    So what can you do to keep yourself secure?

    Join us to see why sandboxing is the perfect solution to these advanced threats and despite what you may have heard – IS affordable and simple to use.

    In the session we’ll cover:
    • Why organizations like yours need sandboxing
    • How Sophos Sandstorm keeps you secure against the latest threats
    • Getting started with sandbox protection that’s simple to use and affordable

    With over 17 years’ experience in information security, Peter currently specializes in Sophos advanced threat and Web security solutions.
  • Social Engineering - Are you the weakest link? Recorded: Aug 30 2016 57 mins
    Greg Iddon, Technologist, Sophos
    Social Engineering has been around for as long as the crooks have but in a modern online world, running a con game has never been easier. And that’s why we need to be savvy.

    A social engineer can research you on Facebook and LinkedIn; read up about your company on its website; and then target you via email, instant messaging, online surveys…and even by phone, for that personal touch. Worse still, many of the aspects of a so-called “targeted attack” like this can be automated, and repeated on colleague after colleague until someone crumbles.

    Greg Iddon will take you into the murky world of targeted attacks, and show you how to build defences that will prevent one well-meaning employee from giving away the keys to the castle.
  • Ransomware - To pay or not to pay? Recorded: Jul 5 2016 60 mins
    Peter Mackenzie
    Flying spiders, snakes, and ghosts are long gone. Ransomware is now the stuff of nightmares and it’s easy to see why.

    Ransomware has become one of the most widespread and damaging threats internet users now face. Since the infamous CryptoLocker first appeared in 2013, we’ve seen a new era of file-encrypting ransomware variants delivered through spam messages and Exploit Kits, extorting money from home users and businesses alike.

    Join Sophos ransomware pro, Peter Mackenzie, as he shows us how ransomware attacks work, explains why so many new infections keep surfacing, and what practical precautions you can take to protect your organisation.
    If this webinar doesn’t help an IT Hero sleep at night, we don’t know what will.
  • Sophos Mobile Control: Don’t get caught out by the phoneys Recorded: Jun 30 2016 55 mins
    James Burchell, Senior Engineer, Sophos
    Enabling the latest mobile technology while keeping your organisation’s data safe can be a challenge. Secure, monitor and control mobile devices with Sophos solutions. The self-service portal makes mobile management easy and stops Bring Your Own Device (BYOD) or Choose your own device (CYOD) from becoming an IT nightmare.

    This webinar addresses the major mobility challenges for IT managers and their teams and demonstrate effective solutions with Sophos Mobile Control.
Sophos
Sophos

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Social Engineering - Are you the weakest link?
  • Live at: Aug 30 2016 1:00 pm
  • Presented by: Greg Iddon, Technologist, Sophos
  • From:
Your email has been sent.
or close