Featured
Episode 4: How to build a social engineering defense plan
Chris Novak, Jennifer Varner
Innovation Showcase Series: How to build a social engineering defense plan
Companies are getting massively hit with Social Engineering attacks, with bad actors looking for ways to breach an organization by stealing credentials, loading malware or ransomware, defrauding customers and stalking, shaming, doxing and swatting executives. Generational AI will make this worse, continuing to make this cheaper and easier for the bad guys and harder to combat.
Businesses need to act quickly to build a comprehensive, end-to-end solution to help protect their employees, customers, executives, and brand from social engineering attacks. To build a social engineering defense plan, you need more than just endpoint protection, you need a holistic approach to help secure your entire infrastructure.
In this webinar you will learn:
- The components of a sample end- to -end social engineering defense plan
- The immediate and simple first step to take to help increase your business’ security posture
- How other businesses are helping to defend their stakeholders with an E2E plan
- What to look for in a partner to build a holistic plan
All episodes
-
Episode 1: How to run successful Zero Trust and SASE transformation programs
Ashish Khanna, Stephen Young,Thomas Raschke
Innovation Showcase Series: Episode1
Many organizations struggle with implementing safeguards against existing and emerging threats directly within their infrastructures. Likewise, next-generation transformation projects built on Zero Trust and/or SASE frameworks suffer from complexity and often lack a trusted partner for security.
The Verizon Cyber Defense Security consulting practice addresses these challenges by helping organizations mitigate risks and protect against cyberthreats. Our end-to-end solutions range from architecture design and implementation to ongoing management services. We provide services in the domains of next-generation cyber defense (cloud security, vulnerability management, IT/OT segmentation), Zero Trust Networking (ZTN), SASE services and IT and application security.
Learn how Verizon’s Cyber Defense Security consulting services deliver a comprehensive approach to cybersecurity, how our team of expert consultants helps fortify your infrastructure environment and what we can do to simplify your complex Zero Trust or SASE based transformation programs.
-
Episode 2: Challenges of implementing a SASE framework
Yin Johnson, Konstantin Heldt
Innovation Showcase Series: Episode 2
In a world with an ever expanding reliance on cloud-native applications and a mobile workforce, the traditional approach to ensure network availability security through adding dedicated appliances and specialized systems can be expensive and time consuming. Moving to a Secure Access Service Edge (SASE) framework that merges network management capabilities and network security can offer more network flexibility, reduce system complexities and overhead, improve network performance, and improve security across virtually all locations. There is no one-size-fits-all answer to a SASE implementation. Moving from a traditional network and security approach to a SASE framework should be done thoughtfully with an eye for what best suits your needs.
Join this discussion to learn more about how to approach your SASE adoption.
- Cross-technology integration -- networks, cloud applications, edge computing and devices
- Orchestrating the components of SASE to bring them all together
- Operationalizing across the organization
- Bring the right expertise to the table -
Episode 3: Know Where Your Organization is at Risk
Alex Pinto (Verizon), Andrew Roth (Verizon), Chris Griffith (Balbix), Roni Angel (Verizon), Umang Barman (Balbix)
Innovation Showcase Series: Episode 3
Organizations, regardless of size or industry, are at risk of cyberattacks— creating a growing need to understand external and internal threats, risks, vulnerabilities and security postures.
According to Verizon’s 2023 Data Breach Investigations Report, System Intrusion, Basic Web Application Attacks, and social engineering now represent the greatest percentage of all security incidents. Existing tools work in a silo. While these tools can identify the obvious weaknesses, it is difficult and resource intensive to combine the output to highlight the hidden sources of risk. Like what SIEM solutions have done for event detection and incident response, Verizon’s Cyber Risk Programs serves as a central repository for risk. It allows our customers to align security investments and resources efficiently, addressing risk management and making the most of your security budget.
This webinar will focus on how Verizon can help you:
- Identify risks by analyzing the data associated with assets, such network and application vulnerability scan results, policy compliance assessments, associated user risk, and device “blast radius.”
- Get an objective review of your external and internal cloud security posture as related to the most common threat patterns.
- Protect your email gateway, web applications and users from malware & ransomwareOur team of experienced and certified professionals will serve as your organization’s trusted advisors, helping you to navigate through the complexities of compliance risk, executive leadership reporting and securing your organization from threats.
Join this informative webinar to learn more about how Verizon’s Cyber Risk Program can help you make more informed cyber-risk decisions, backed by the integrity, capability and reliability of our services and people.
-
Episode 4: How to build a social engineering defense plan
Chris Novak, Jennifer Varner
Innovation Showcase Series: How to build a social engineering defense plan
Companies are getting massively hit with Social Engineering attacks, with bad actors looking for ways to breach an organization by stealing credentials, loading malware or ransomware, defrauding customers and stalking, shaming, doxing and swatting executives. Generational AI will make this worse, continuing to make this cheaper and easier for the bad guys and harder to combat.
Businesses need to act quickly to build a comprehensive, end-to-end solution to help protect their employees, customers, executives, and brand from social engineering attacks. To build a social engineering defense plan, you need more than just endpoint protection, you need a holistic approach to help secure your entire infrastructure.
In this webinar you will learn:
- The components of a sample end- to -end social engineering defense plan
- The immediate and simple first step to take to help increase your business’ security posture
- How other businesses are helping to defend their stakeholders with an E2E plan
- What to look for in a partner to build a holistic plan