The 2019 Insider Data Breach survey gathered responses from 252 U.S. and 253 U.K.-based IT leaders (CIOs, CTOs, CISOs and IT Directors) and 2004 U.S. and 2003 U.K.-based employees to assess the root causes of these employee-driven data breaches, as well as the frequency and impact of such instances.
Download the...
Office 365 provides a solid foundation to which many organizations should add third-party solutions in order to provide higher levels of security, content management, encryption and other capabilities.
Download this Osterman Research report and learn about Office 365's:
Limitations in data loss prevention...
A recent report from Osterman Research has shown that while Office 365 has many benefits, its broad, one-size-fits-all approach means not all information security scenarios and use cases are addressed. As a result, organizations are spending 37% of the average Office 365 deployment budget on complementary third-party...
Office 365 provides a solid foundation to which many organizations should add third-party solutions in order to provide higher levels of security, content management, encryption and other capabilities.
Download this Osterman Research report and learn about Office 365's:
Limitations in data loss prevention...
A new generation of cybercriminal organizations that pair identity deception techniques with personalized, socially-engineered emails are the driving force behind rapidly-evolving, socially-engineered email threats that grow more dangerous by the day.
Businesses aren't alone in the crosshairs. Every minute of the...
Most companies have huge gaps in their cyber defenses, and can be compromised at will by a determined hacker. The industry even has a term for it: Assume Breach.
Join Roger A. Grimes, a 30-year computer consultant, for this webinar where he explores the latest research on what's wrong with current defenses and how...
Email is Insecure
Boards of directors need effective communication and collaboration in order to reach their goals and fulfill the mission of the organization. Unfortunately, this puts corporate secretaries, general counsels and main board administrators under a lot of pressure to manage, secure and govern board...
This session looks at two real-life case studies, with different outcomes from the same initial starting point for two companies. The first led to £140k loss due to malicious invoicing; the second led to data exfiltration and reputational damage (as well as ICO reporting due to GDPR).
Malicious actors use common...
As you know, impostor email continues to be a challenge for most security professionals. We are going to discuss the tactics and targets of impostor email via this Email Fraud Workshop breakout. Denis Ryan, Sr. Director of Email Fraud at Proofpoint, will discuss:
The email threat landscape;
How to identify potential...
Cyberattacks and damages due to email breaches dramatically increased again this past year. The FBI estimates $5 billion in losses worldwide as email continues to be a primary attack vector for the initial compromise, with business email compromise accounting for $676 million in losses alone in 2017.
As SMB...
A consistent message throughout this Summit: Most threats to an organization continue to enter through the route of least resistance - email. In this session, hear directly from a CISO on why email security needs renewed focus and how he's addressed it in his own organization, including:
Why smart employees continue...
File-less malware is a huge security challenge for organizations today, and traditional email security controls aren't sufficient to meet the challenge. It's time for a new approach email security.
The big issue is: The malicious payloads shift so much. It's really easy to do 100 variants of the same malicious...
File-less malware is a huge security challenge for organizations today, and traditional email security controls aren't sufficient to meet the challenge. Burke Long of Lastline offers insight on a new way to approach email security.
Phishing is one of the most devastating threats hitting organizations every day. It's the most dangerous and costly cyber threat across the globe. Just one successful phishing attempt against your employees provides the foothold that cyber criminals need to access your entire corporate network.
A joint study...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.