Phishing Defence in 2020: What the Heck Just Happened & What's Next?

Presented by

Cofense Security Solutions Advisor, Tonia Dudley and Senior Director of Sales Engineering, David Mount.

About this talk

2020 has been quite the year. And it’s not over yet! If you’re still trying to get a grip on what has happened in the phishing threat landscape - from COVID-themed phishing attacks to data stealing ransomware and everything in between – you aren’t alone. We are all getting through this together and uniting to fight phishing. Join us on 14 October at 14:00 BST to hear from Cofense Security Solutions Advisor, Tonia Dudley and Senior Director of Sales Engineering, David Mount. They’ll walk you through the threats observed by Cofense, the predictions we’re making for the remainder of the year, and the lessons we’ve learned on how to protect organizations from the phishing threats that evade perimeter defences. Highlights will include: • Insights of various phishing campaigns that evaded SEGs and reached end users, delivering credential phish and malware. • How threat actors are evolving and adapting their tactics, making it more difficult for end users to know what’s safe and what’s not. • Expert predictions of what is coming in the remainder of 2020 and into 2021.

Related topics:

More from this channel

Upcoming talks (9)
On-demand talks (126)
Subscribers (20268)
Steve Durbin, Chief Executive of the ISF and ISF analysts will present the ISF webinar series: "In pursuit of the secure organisation..." We will be sharing thought leadership and practical guidance drawn from ISF Members, which include many of the world’s leading Fortune and Forbes listed organisations) on how to address cyber, information security and risk management issues facing businesses and their security teams. 1. Emerging Cyber Threats (ISF Threat Horizon annual series) 2. The role of the CEO and business leaders in cyber security 3. Being a successful CISO 4. Cyber-attack trends 5. Critical Asset Management 6. Data breach prevention 7. Supply chain 8. Insider Threat and the role of the end user