A Practical Guide for Managing Today’s Targeted Phishing Attacks

Jason Woo, Product Marketing Manager, Websense
Phish or no phish? That’s the question that employees—and executives in particular—have been asking themselves more frequently. They’ve heard about how high profile organizations and even government agencies have fallen prey to attacks that stemmed from seemingly harmless emails. Has the door been left wide open?

Join Websense on June 20th as we provide guidance on how you can recognize advanced threats and protect yourself from them. Attendees will gain practical insights into:

· Recent Email Phishing Schemes

· Telltale Signs of Advanced Targeted Attacks

· Best Practice Principles to Educate Users

· Technology Capabilities to Minimize Risk of Compromise
Jun 20 2012
41 mins
A Practical Guide for Managing Today’s Targeted Phishing Attacks
Join us for this summit:
More from this community:

IT Security

Webinars and videos

  • Live and recorded (4498)
  • Upcoming (164)
  • Date
  • Rating
  • Views
  • Join backup and recovery experts to find out how to build your backup and recovery requirements checklist. By the end of this session, you’ll learn how you can:

    -Cut storage requirements by up to 80%
    -Save on storage costs and performance hits to your network.
    -Leverage near-instant recovery technology for protected virtual machines or servers.
    -Automate application-aware backups and testing for data corruption.
  • Join backup and recovery experts to find out how to build your backup and recovery requirements checklist. By the end of this session, you’ll learn how you can:

    -Cut storage requirements by up to 80%
    -Save on storage costs and performance hits to your network.
    -Leverage near-instant recovery technology for protected virtual machines or servers.
    -Automate application-aware backups and testing for data corruption.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Now that NIST has published Version 1.0 of the Framework for Improving Critical Infrastructure Cybersecurity, the long awaited CSF, what are the implications for companies? How can the CSF help your business improve its defenses? Cameron camp investigates.
  • Deploying and managing network security at remote locations can be time consuming and expensive. McAfee Next Generation Firewalls give your organization a simple solution for centrally deploying, managing and updating remote locations. No technical skills are required to install at remote locations, freeing your skilled staff to focus on more important security management.

    Join us for an in-depth look at how plug-and-play deployment and remote management can reduce manual effort, reduce costs, and improve your network service. Steve Smith, Senior Technical Manager at McAfee, will review how the McAfee NGFW can be installed and up and running in a matter of minutes using our cloud-based installation server. He will also review how the McAfee NGFW Security Management Center gives you remote management and enterprise-wide situational awareness.
  • Today’s security event monitoring and correlation tools are under enormous pressure. Security Analysts are inundated with data, but rather than being given insight, it is more difficult than ever to sort through and locate the real events that need attention. The next generation of security tools purports to process much larger and a greater variety of data sets, run deep-dive analytics in real-time, and rely more on intelligence than attack signatures. But what does this actually mean?

    How do I collect the right data?
    What kinds of new detections can I do?
    How do I get enough context to overcome false positives?
    How do I automate more of my security intelligence, or the intelligence of others?
    What should I look for in a solution?
    How is this different from my SIEM, IDS/IDS, and Advance Malware Detection products?

    These, and other questions, will be addressed to shed light on what has quickly become a market space of tremendous promise, but currently shrouded in confusion.
  • Today’s security event monitoring and correlation tools are under enormous pressure. Security Analysts are inundated with data, but rather than being given insight, it is more difficult than ever to sort through and locate the real events that need attention. The next generation of security tools purports to process much larger and a greater variety of data sets, run deep-dive analytics in real-time, and rely more on intelligence than attack signatures. But what does this actually mean?

    How do I collect the right data?
    What kinds of new detections can I do?
    How do I get enough context to overcome false positives?
    How do I automate more of my security intelligence, or the intelligence of others?
    What should I look for in a solution?
    How is this different from my SIEM, IDS/IDS, and Advance Malware Detection products?

    These, and other questions, will be addressed to shed light on what has quickly become a market space of tremendous promise, but currently shrouded in confusion.
  • This Analyst Briefing will cover key findings from Frost & Sullivan’s suite of video technology research for 2013, as well as the Digital Media research team’s impressions and conclusions from the 2014 National Association of Broadcasters (NAB) Show, taking place April 5-10, 2014 in Las Vegas.

    Reasons to Attend:

    •Understand key technical trends in content delivery and monetization, and their impact on video encoding/transcoding offerings
    •Gain insight into worldwide market growth opportunities
    •Receive highlights related to the competitive landscape
    •Identify customer perceptions and requirements when choosing vendors and solutions
  • Today’s IT professionals need security firewalls that do more than just packet filtering and stateful inspection. It’s critical that network pros redefine which metrics will actually ensure their security solutions will not be a performance bottleneck. This webinar digs into today’s firewall solutions, exploring their capabilities and providing pointers for selecting the solution that best meets IT security and performance requirements.

    What You Will Learn
    Why packet filtering and IPS aren’t the only performance metrics that matter
    The performance impact of running multiple security services
    How to select in-line security products that meet today’s multi-function security needs
  • Are attacks on your network and users still occurring, despite continuing efforts to stay on top of security? What impact would malware have on your business if it was able to gain internal access and steal sensitive information?

    Without solutions that can disrupt the chain of events that occur during an advanced attack, many businesses are still being infiltrated and losing data every day. This webinar will cover the best practices in disrupting attacks with content security solutions - connected to optimize protection.
    Join this webinar as:
    •You will learn the tactics used by attackers today to infiltrate businesses
    •You will hear about the leading technologies available to disrupt advanced attacks
    •You will walk away with the knowledge to assess your own environment, and optimize your security
    Businesses today face more advanced attacks than we’ve ever seen in the past – and defending against them takes a connected approach which can disrupt the multiple points of infiltration and exfiltration used in the process of a breach. With most attacks seen in the wild using phishing emails to reach their target, a web link or malicious file to deliver a payload, and an outbound stream of communication to exfiltrate data – implementing a Secure Email Gateway, Secure Web Gateway, and Data Loss Prevention technology together will provide a barrier difficult for even the most advanced attacks to overcome.

    Don’t miss this webinar if you have a stake in the security of your most valuable information, or are directly responsible for the implementation of security solutions to protect it. Register now for this 30 minute webinar.
  • Channel
  • Channel profile
Up Down
  • Threat defenses: Before, during and after the point of click Recorded: Jul 8 2013 48 mins
    Produced by SC Magazine and Websense, this webcast explains how to protect against malware, advanced threats and data theft with continuous defenses before, during and after the point of click.

    This webcast outlines advanced threat stages and explains how protection in early stages can quickly block attacks, and how real-time, inline threat analysis protects against threats, data loss and data theft at the point of click. And learn how containment defenses are using sandboxing and traffic analysis to identify, profile and protect after the click. Combined, security administrators and teams are better armed to protect users, data and resources.

    Learn how threat defenses have evolved to include:

    - Global threat awareness and analysis to protect before the point of click.
    - Inline, real-time defenses during the point-of-click for protection against threats and data theft.
    - Sandboxing of malware and traffic analysis to identify and protect after the click.
    - Equal protection from both web and email attacks for office workers and remote workers.
  • Hit “Like” and Keep your Data Secure: Safe Social Media Use for Business Recorded: Mar 12 2013 45 mins
    When you consider the abundant security risks, many companies are still wary about broadly enabling social media. After all, nowadays your social media identity may be more valuable to cybercriminals than your credits cards. However, with the right tools, it is possible to be safe while being social. In this webcast, we’ll examine the latest tactics cybercriminals are using within social media to target individuals and get access to information. We’ll also discuss the importance of real-time defenses at the gateway and review Websense social controls and video categories. Other topics will include: - Seven stages of advanced threats and how social networking plays into early stages - Websense defenses for social media threats (inline, real-time, etc.) - Benefits of the Websense/Facebook partnership.
  • Seven Stages of Advanced Threats & Data Theft Recorded: Sep 27 2012 52 mins
    Targeted attacks are now well beyond traditional URL+AV defenses, and forward facing defenses do not provide containment against data theft and cybercrime call-home communications. In addition, cloud apps, mobility and remote users are increasing SSL use that is often a blind spot for many defenses. Change is the only constant in the IT security world and being educated on threat stages, defenses, and effectiveness is paramount.
  • A Proactive Approach to Modern Malware using Forensics & Sandboxing Recorded: Sep 6 2012 48 mins
    CISOs around the world are telling analysts that the majority of today’s emerging threats are bypassing their anti-virus, firewalls, and intrusion prevention solutions. In response, analysts suggest that IT needs to assume a more proactive stance. Such a shift can involve more tightly integrated defenses, strengthening in-house IT resources, and leveraging appropriate outside resources. In this webinar, Websense will discuss ways to begin this shift today including:

    - Expanding ‘inbound’ defenses to include ‘outbound’ controls
    - Options for enhancing in-house IT security expertise
    - Leveraging research-grade forensic tools such as Websense ThreatScope™

    Real-world context will be provided as an actual malware sample undergoes forensic dissection and the Websense CyberSecurity Intelligence™ service is reviewed as a concrete example of the capabilities of today’s threat intelligence marketplace.
  • Why Mobile Device Management Needs Mobile Security Recorded: Jul 11 2012 32 mins
    The consumerization of IT is hitting hard and Mobile Device Managment (MDM) needs mobile security. Personal and corporate-owned devices are flooding the workplace. Companies need to secure these devices, and they are turning to Mobile Device Management (MDM).

    But an MDM solution will not address your primary concerns around securing your data. Learn how to safely allow mobile devices in the workplace while protecting against mobile threats and data loss.
    Key topics in the session will include:

    · Mobility trends including consumerization of IT
    · Profile of a mobile user
    · Current approaches to Mobile Security
    · The Websense approach
  • A Practical Guide for Managing Today’s Targeted Phishing Attacks Recorded: Jun 20 2012 41 mins
    Phish or no phish? That’s the question that employees—and executives in particular—have been asking themselves more frequently. They’ve heard about how high profile organizations and even government agencies have fallen prey to attacks that stemmed from seemingly harmless emails. Has the door been left wide open?

    Join Websense on June 20th as we provide guidance on how you can recognize advanced threats and protect yourself from them. Attendees will gain practical insights into:

    · Recent Email Phishing Schemes

    · Telltale Signs of Advanced Targeted Attacks

    · Best Practice Principles to Educate Users

    · Technology Capabilities to Minimize Risk of Compromise
  • Get Rid of the Fear: A Practical Approach for Using DLP to Manage Risk Recorded: Apr 5 2012 45 mins
    CIOs don’t need to be convinced about data loss protection. Compliance, financial implications, brand reputation are all factors that drive this need. The real problem is that people are afraid of failure and wasting time, money, resources. They've heard about the operational nightmares, the complexity and failed deployments over the last several years. In addition, RSA and Symantec both had data stolen publically, implying the integrity of the solutions’ value is uncertain.

    During this interactive session attendees will receive valuable insight on how security works and learn the secret of understanding and communicating risk. Equipped with this knowledge, Andrew will provide a practical and measurable framework for managing risk to information assets using Data Loss Prevention.

    What attendees will learn:
    Guiding Principles of Security and Risk Management
    Data Breach Trends from the Last 6 Years
    DLP Methodology and Execution Strategy
    Success Factors in Addressing the Web DLP Challenge
  • 2012 Threat Update Recorded: Feb 27 2012 48 mins
    2011 was arguably the most surprising year in IT security history, with groundbreaking breaches at many of the world's top organizations. In this webinar we will analyze the threats and trends of 2011 while offering guidance for dealing with the evolving security landscape of the future. Key topics will include:
    Significant discoveries and events from 2011 and lessons to take away
    Detailed threat analysis by threat type, delivery, region, and more
    Statistical roll-up of top spam topics by category and email type
    Data theft and loss events and how containment defenses continue to evolve

    Websense Threat Report findings are fueled by the Websense Advance Classification Engine (ACE) and the Websense ThreatSeeker™ Network, one of the world's largest security intelligence networks with over 850 million end users providing 3-5 billion requests per day for security, data and content analysis.
  • Contextual Defenses for Web 2.0 Recorded: Feb 8 2012 36 mins
    Today’s ever-evolving Web and age of advanced persistent threats are spelling an end to static defenses focused on inbound known threats. In addition, surging trends such as consumer apps and cloud computing, social networking, plus mobility are redefining the perimeter and making real-time contextual defenses a requirement. Join Websense on February 8th as we discuss Contextual Defenses for Web 2.0 and offer guidance for how you can protect today’s empowered users from advanced malware while containing data theft. This webinar will discuss key requirements for defenses in the modern day including:

    · Inline real-time contextual defenses providing composite assessments

    · HTTPS/SSL traffic inspection at various levels depending on context

    · User and destination awareness by security zone, category, app or specific site
Webcasts for Content Security Professionals
Websense, Inc., a global leader in unified Web, data, and email content security, delivers the best security for modern threats at the lowest total cost of ownership. Our channel will include frequent webinars aimed at helping companies protect themselves against modern threats.
Try a powerful marketing platform for your videos and webinars. Learn more  >

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: A Practical Guide for Managing Today’s Targeted Phishing Attacks
  • Live at: Jun 20 2012 5:00 pm
  • Presented by: Jason Woo, Product Marketing Manager, Websense
  • From:
Your email has been sent.
or close
You must be logged in to email this