Featured
Using Threat Intelligence to Fortify Your Program and People
Geoff Parker, Diebold Nixdorf, Daina McFarlane, Mountain Equipment Company, and Garrett Guinivan, Proofpiont
The threat landscape moves fast. Social engineering techniques such as QR code phishing, generative AI deep fakes, and Business Email Compromise (BEC) are constantly evolving.
According to the 2024 State of the Phish Report, most security teams say they use real-world threat intelligence to shape their security awareness program. However, using it effectively across the organization is a big challenge. As new lures and trends appear, it’s essential to consistently ensure your employees are resilient against the nature, scope and impact of the cybersecurity threats they face.
Join us for a 60-minute panel discussion with guest panelists as they tell stories and explain best practices about using threat intelligence to fortify their program and people such as:
- How to engage people with training that is creative, impactful—and ready to shift as needed
- The importance of real-world behavior metrics for analyzing and acting upon insights
- The power of cross-functional collaboration (such as with SOC) to be agile and focused
- Tips to mature your security culture by approaching end users as “friends not foes”
All episodes
-
The Human Factor in Business Email Compromise
Dave Cook, Senior Product Marketing Manager and Brian Reed, Senior Director, Cybersecurity Strategy
Business Email Compromise (BEC) isn't just about technology – it's about people. Cybercriminals exploit human trust and vulnerabilities to manipulate employees into transferring money or sensitive information. In today's evolving threat landscape, human-centric security is crucial to mitigating BEC attacks.
Join us for this 30-minute webinar to understand how attackers leverage the human element in BEC scams, and discover best practices for building a robust defense. We'll delve into:
- The human element: How attackers exploit human psychology and behavior in BEC attempts.
- Targeted attacks: Who are the most vulnerable employees, and how are they targeted?
- Building a people-centric defense: Practical strategies to empower your workforce and safeguard your organization. -
Using AI to Stop Email Misdelivery and Prevent Sensitive Data Loss
Andrew Goodman
Have you ever sent an email to the wrong person? What about sending an email with the wrong attachment? What visibility do you have into these potential costly mistakes at your organisation?
This lack of visibility into the risk of sensitive data loss from misdirected emails is a common problem for many organisations, resulting in negative impacts on their business, such as significant productivity loss when unreported incidents are detected.
Join us for a 45-minute webinar to learn about:
* High profile examples of sensitive data loss from misdirected emails
* The business and legal consequences of leaving misdirected emails unaddressed
* The power of artificial intelligence (AI) to stop sensitive data loss
* Stopping sensitive data loss from misdirected emails in just daysWe’ll also live demo how an Adaptive Email DLP solution stops misdirected emails for good.
-
Strengthening Microsoft 365 with Human-centric Security
Tim Bedard, Director, Product Marketing and Mark Harris, Cybersecurity Advisor
Microsoft’s native and add-on email security capabilities help to protect against basic threats, but they aren’t enough to ensure full protection. Learn how a multi-layered human-centric security strategy can augment Microsoft 365 to defend against modern threats like business email compromise, advanced phishing, account takeover, impersonation abuse, and accidental data loss.
Join us for a 45-minute live webinar. We will discuss:
- What are today’s top cyber risks
- What are the most recent threat trends targeting Microsoft
- Where should you augment your Microsoft 365 security
- How do you strengthen your Microsoft 365 defenses -
Using Threat Intelligence to Fortify Your Program and People
Geoff Parker, Diebold Nixdorf, Daina McFarlane, Mountain Equipment Company, and Garrett Guinivan, Proofpiont
The threat landscape moves fast. Social engineering techniques such as QR code phishing, generative AI deep fakes, and Business Email Compromise (BEC) are constantly evolving.
According to the 2024 State of the Phish Report, most security teams say they use real-world threat intelligence to shape their security awareness program. However, using it effectively across the organization is a big challenge. As new lures and trends appear, it’s essential to consistently ensure your employees are resilient against the nature, scope and impact of the cybersecurity threats they face.
Join us for a 60-minute panel discussion with guest panelists as they tell stories and explain best practices about using threat intelligence to fortify their program and people such as:
- How to engage people with training that is creative, impactful—and ready to shift as needed
- The importance of real-world behavior metrics for analyzing and acting upon insights
- The power of cross-functional collaboration (such as with SOC) to be agile and focused
- Tips to mature your security culture by approaching end users as “friends not foes”