Browse communities
Browse communities
Presenting a webinar?

A Practical Guide for Managing Today’s Targeted Phishing Attacks

Jason Woo, Product Marketing Manager, Websense
Phish or no phish? That’s the question that employees—and executives in particular—have been asking themselves more frequently. They’ve heard about how high profile organizations and even government agencies have fallen prey to attacks that stemmed from seemingly harmless emails. Has the door been left wide open?

Join Websense on June 20th as we provide guidance on how you can recognize advanced threats and protect yourself from them. Attendees will gain practical insights into:

· Recent Email Phishing Schemes

· Telltale Signs of Advanced Targeted Attacks

· Best Practice Principles to Educate Users

· Technology Capabilities to Minimize Risk of Compromise
Jun 20 2012
41 mins
A Practical Guide for Managing Today’s Targeted Phishing Attacks
More from this community:

IT Security

  • Live and recorded (5378)
  • Upcoming (118)
  • Date
  • Rating
  • Views
  • Did you know the average breach goes undetected for 229 days? The earlier you can detect and respond to a breach, the faster you lower the risk and potential damage. Traditionally, companies have implemented a number of point solutions to for each new threat, an expensive and cumbersome approach. However, by combining threat protection from Fortinet with threat detection and response from AlienVault, companies now have an affordable way to significantly reduce the cost and complexity of complete threat management.

    Join threat experts from AlienVault and Fortinet for this webcast to learn how this integrated solution will provide:

    · Continuous threat prevention, detection and remediation in an easy-to-use solution

    · The ability to identify all critical assets and the potential attack surfaces in your network

    · Advanced analysis of FortiGate logs for threat identification and response through AlienVault USM

    · Simplified protection of your network with ONLY two products, at a price you can afford

    · Continual improvement of your security posture through frequent assessment.

    · Integrated threat intelligence that maximizes the efficiency of your security monitoring program
  • As organisations accept that they are more than likely to be breached, strengthening business resilience and response capabilities is becoming just as important as developing defensive strategies. As a result, organisations are crafting risk-based approaches to balance their priorities in order to protect, detect, respond and recover.

    Drawing on the findings of the Infosecurity Europe Industry Survey, this panel of industry experts will discuss the challenges for information security practitioners and how to prioritise and balance risk. The speakers will share insight into how to develop an information security strategy that protects the organisation’s information assets, whilst ensuring it is resilient and capable of responding robustly to incidents.
  • Companies rely heavily on networked technology today to operate their businesses. Highly distributed organizations like restaurant chains, retail stores, financial services or supply chain companies have an extra layer of difficulty. Rarely does each of the remote locations have IT expertise on site. As an IT manager, you are demanded by your executive management to keep the network available 100% of the time, avoid security breaches, support all the new strategic marketing initiatives and to do all of this with less money than you had in your budget last year! This session will review the top 5 challenges an IT manager in this situation needs to consider and suggest solutions:

    1) Executive mandate to "Do more with less"
    - Free-up your time to do what you do best
    - Vendor consolidation
    - Outsource, focus Internal resources on strategic tasks

    2) Lack of IT Expertise at remote sites
    - Consistency of deployment, Office in a box
    - How to make sure all locations have the same technology
    - Preplanned for growth and new services

    3) Sometimes lack of ownership of remote sites (Franchises)

    4) Security compliance/PCI DSS

    5) High availability
    - Network is down, business has stopped (can't take payments)
  • Join us to hear Africa Director Hendrik Malan and guest speaker Grant Theis, CEO of ttrumpet, as they discuss the emergence of Over-the-Top (OTT) providers and the potential opportunities for growth in the enterprise market.
  • Wie Sie in drei Schritten ein klares IT-Configuration Management aufsetzen

    Als Verantwortlicher für IT-Security sind Sie konstant mit möglichen Angriffszenarien und deren Abwehr beschäftigt. Ein Großteil der Angriffe sind nur deshalb erfolgreich, weil Komponenten in Ihrem Netzwerk unzureichend konfiguriert sind.
    Die Herausforderung ist, genau diese Maschinen zu identifizieren und sicher zu stellen, dass sie korrekt konfiguriert werden und dies auch bleiben.
    Lernen Sie in unserm Webcast wie Qualys Policy Compliance Ihr IT-Configuration-Management verbessern kann und damit Ihre Basis-Security stärkt und das Ganze voll automatisiert.
    Erfahren Sie:
    • Etablieren und Umsetzung von Security Configurations
    • Automatisierung und Durchführung von regelmäßigen Configuration Assessments
    • Priorisierung und Umsetzung von Remedation Workflows
  • Vous souhaitez en finir avec l’information dispersée à travers des centaines de répertoires partagés, espaces personnels, et disques durs locaux ?

    Vous êtes à la recherche d’une plateforme collaborative tout-en-un ?

    Vous êtes certainement déjà familier avec Microsoft SharePoint, mais êtes-vous sur de connaître l’étendue de son périmètre fonctionnel ?

    Car si SharePoint reste une excellente plate-forme intranet, de portail web, de collaboration et de partage documentaire, SharePoint va bien au-delà de ces fonctions avec le réseau social (RSE), les outils de développement, et la gestion documentaire (de type GED).

    Participez à notre webinar pour mieux comprendre la richesse de la plateforme et ses bénéfices : une collaboration unifiée et des gains de productivité à chaque niveau de l’entreprise (utilisateurs métiers, DSI, direction).

    Nous aborderons également les modèles de déploiement de SharePoint (100 % cloud, hybride ou on-premises) ainsi que les limites et bénéfices de chaque configuration.

    Dans un second temps, nous nous pencherons sur les questions de déploiement de SharePoint et nous découvrirons comment AvePoint, avec sa solution de migration pour SharePoint 2013 & Office 365, vous permet d’accélérer la mise en place de votre plateforme.

    Nous ferons un tour d’horizon des problèmes les plus communément rencontrés pendant les projets de migration, et nous verrons en 3 points comment AvePoint vous permet notamment de les adresser :

    • Optimisation des ressources dédiées à la migration en automatisant la suppression du contenu obsolète

    • Réduction de la perturbation des activités pendant le processus de migration grâce à une planification personnalisée.

    • Maintien de l’ensemble du contenu, des permissions et des métadonnées jugés pertinents par vos équipes.
  • In the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.
  • In the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.
  • In the age of digital transformation trust is key to the growth of services in both the public and private sectors. With more and more services evolving and innovating around digital identity there is a universal need to bridge and balance business incentives with government requirements. At Kantara Initiative we see the transformation cycle as a 4 stage process: strategy setting, innovation, deployment, and assurance. Few, if any, organizations can succeed at all of the strategic stages of change and innovation in isolation. We invite you to join us to discuss how trust frameworks will evolve to bridge the digital transformation of identity assurance.
  • CyberEdge Group, a premier information security research firm, recently announced the results of its 2015 Cyberthreat Defense Report. Designed to complement Verizon’s annual Data Breach Investigations Report, this report provides a 360-degree view of organizations’ security threats, current defenses, and planned investments. Over 800 security decision makers and practitioners from across North America and Europe were surveyed in December 2014. Attend this insightful webinar to learn:

     How many were affected by a successful data breach in 2014
     How many think they’ll be victimized in 2015
     What portion of IT spending is dedicated to security
     Which cyberthreats concern security professionals the most
     Which security defenses are present or planned for acquisition
     Plus two dozen additional insights from security professionals just like you
  • Channel
  • Channel profile
  • Threat defenses: Before, during and after the point of click Recorded: Jul 8 2013 48 mins
    Tom Clare, Senior Director of Product Marketing, Websense.
    Produced by SC Magazine and Websense, this webcast explains how to protect against malware, advanced threats and data theft with continuous defenses before, during and after the point of click.

    This webcast outlines advanced threat stages and explains how protection in early stages can quickly block attacks, and how real-time, inline threat analysis protects against threats, data loss and data theft at the point of click. And learn how containment defenses are using sandboxing and traffic analysis to identify, profile and protect after the click. Combined, security administrators and teams are better armed to protect users, data and resources.

    Learn how threat defenses have evolved to include:

    - Global threat awareness and analysis to protect before the point of click.
    - Inline, real-time defenses during the point-of-click for protection against threats and data theft.
    - Sandboxing of malware and traffic analysis to identify and protect after the click.
    - Equal protection from both web and email attacks for office workers and remote workers.
  • Hit “Like” and Keep your Data Secure: Safe Social Media Use for Business Recorded: Mar 12 2013 45 mins
    Joerg Sieber, Product Marketing Manager for Web Security, Websense, Inc.
    When you consider the abundant security risks, many companies are still wary about broadly enabling social media. After all, nowadays your social media identity may be more valuable to cybercriminals than your credits cards. However, with the right tools, it is possible to be safe while being social. In this webcast, we’ll examine the latest tactics cybercriminals are using within social media to target individuals and get access to information. We’ll also discuss the importance of real-time defenses at the gateway and review Websense social controls and video categories. Other topics will include: - Seven stages of advanced threats and how social networking plays into early stages - Websense defenses for social media threats (inline, real-time, etc.) - Benefits of the Websense/Facebook partnership.
  • Seven Stages of Advanced Threats & Data Theft Recorded: Sep 27 2012 52 mins
    Tom Clare, Websense Sr. Director of Product Marketing
    Targeted attacks are now well beyond traditional URL+AV defenses, and forward facing defenses do not provide containment against data theft and cybercrime call-home communications. In addition, cloud apps, mobility and remote users are increasing SSL use that is often a blind spot for many defenses. Change is the only constant in the IT security world and being educated on threat stages, defenses, and effectiveness is paramount.
  • A Proactive Approach to Modern Malware using Forensics & Sandboxing Recorded: Sep 6 2012 48 mins
    Bob Hansmann, Sr. Product Marketing Manager, Websense Security Labs
    CISOs around the world are telling analysts that the majority of today’s emerging threats are bypassing their anti-virus, firewalls, and intrusion prevention solutions. In response, analysts suggest that IT needs to assume a more proactive stance. Such a shift can involve more tightly integrated defenses, strengthening in-house IT resources, and leveraging appropriate outside resources. In this webinar, Websense will discuss ways to begin this shift today including:

    - Expanding ‘inbound’ defenses to include ‘outbound’ controls
    - Options for enhancing in-house IT security expertise
    - Leveraging research-grade forensic tools such as Websense ThreatScope™

    Real-world context will be provided as an actual malware sample undergoes forensic dissection and the Websense CyberSecurity Intelligence™ service is reviewed as a concrete example of the capabilities of today’s threat intelligence marketplace.
  • Why Mobile Device Management Needs Mobile Security Recorded: Jul 11 2012 32 mins
    Stacey Garcia, Product Marketing Manager, Websense
    The consumerization of IT is hitting hard and Mobile Device Managment (MDM) needs mobile security. Personal and corporate-owned devices are flooding the workplace. Companies need to secure these devices, and they are turning to Mobile Device Management (MDM).

    But an MDM solution will not address your primary concerns around securing your data. Learn how to safely allow mobile devices in the workplace while protecting against mobile threats and data loss.
    Key topics in the session will include:

    · Mobility trends including consumerization of IT
    · Profile of a mobile user
    · Current approaches to Mobile Security
    · The Websense approach
  • A Practical Guide for Managing Today’s Targeted Phishing Attacks Recorded: Jun 20 2012 41 mins
    Jason Woo, Product Marketing Manager, Websense
    Phish or no phish? That’s the question that employees—and executives in particular—have been asking themselves more frequently. They’ve heard about how high profile organizations and even government agencies have fallen prey to attacks that stemmed from seemingly harmless emails. Has the door been left wide open?

    Join Websense on June 20th as we provide guidance on how you can recognize advanced threats and protect yourself from them. Attendees will gain practical insights into:

    · Recent Email Phishing Schemes

    · Telltale Signs of Advanced Targeted Attacks

    · Best Practice Principles to Educate Users

    · Technology Capabilities to Minimize Risk of Compromise
  • Get Rid of the Fear: A Practical Approach for Using DLP to Manage Risk Recorded: Apr 5 2012 45 mins
    Andrew Forgie, CISSP Websense Director of Product Marketing – Data Security
    CIOs don’t need to be convinced about data loss protection. Compliance, financial implications, brand reputation are all factors that drive this need. The real problem is that people are afraid of failure and wasting time, money, resources. They've heard about the operational nightmares, the complexity and failed deployments over the last several years. In addition, RSA and Symantec both had data stolen publically, implying the integrity of the solutions’ value is uncertain.

    During this interactive session attendees will receive valuable insight on how security works and learn the secret of understanding and communicating risk. Equipped with this knowledge, Andrew will provide a practical and measurable framework for managing risk to information assets using Data Loss Prevention.

    What attendees will learn:
    Guiding Principles of Security and Risk Management
    Data Breach Trends from the Last 6 Years
    DLP Methodology and Execution Strategy
    Success Factors in Addressing the Web DLP Challenge
  • 2012 Threat Update Recorded: Feb 27 2012 48 mins
    Patrik Runald, Websense Sr. Manager of Security and Research Engineering
    2011 was arguably the most surprising year in IT security history, with groundbreaking breaches at many of the world's top organizations. In this webinar we will analyze the threats and trends of 2011 while offering guidance for dealing with the evolving security landscape of the future. Key topics will include:
    Significant discoveries and events from 2011 and lessons to take away
    Detailed threat analysis by threat type, delivery, region, and more
    Statistical roll-up of top spam topics by category and email type
    Data theft and loss events and how containment defenses continue to evolve

    Websense Threat Report findings are fueled by the Websense Advance Classification Engine (ACE) and the Websense ThreatSeeker™ Network, one of the world's largest security intelligence networks with over 850 million end users providing 3-5 billion requests per day for security, data and content analysis.
  • Contextual Defenses for Web 2.0 Recorded: Feb 8 2012 36 mins
    Tom Clare, Senior Director of Product Marketing at Websense
    Today’s ever-evolving Web and age of advanced persistent threats are spelling an end to static defenses focused on inbound known threats. In addition, surging trends such as consumer apps and cloud computing, social networking, plus mobility are redefining the perimeter and making real-time contextual defenses a requirement. Join Websense on February 8th as we discuss Contextual Defenses for Web 2.0 and offer guidance for how you can protect today’s empowered users from advanced malware while containing data theft. This webinar will discuss key requirements for defenses in the modern day including:

    · Inline real-time contextual defenses providing composite assessments

    · HTTPS/SSL traffic inspection at various levels depending on context

    · User and destination awareness by security zone, category, app or specific site
Webcasts for Content Security Professionals
Websense, Inc., a global leader in unified Web, data, and email content security, delivers the best security for modern threats at the lowest total cost of ownership. Our channel will include frequent webinars aimed at helping companies protect themselves against modern threats.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Practical Guide for Managing Today’s Targeted Phishing Attacks
  • Live at: Jun 20 2012 5:00 pm
  • Presented by: Jason Woo, Product Marketing Manager, Websense
  • From:
Your email has been sent.
or close
You must be logged in to email this