Protecting your Organization Against Phishing Attacks

Watch Now

To watch this webinar you’ll need an Infosecurity Magazine account. Log in or sign up below.

Log in
Sign up

Get up-to-the-minute news and opinions, plus access to a wide assortment of Information Security resources that will keep you current and informed.

This will be used to identify you if you take part in our online comments.

Your password should:

  • be at least eight characters long
  • be no more than 25 characters long
  • contain at least one uppercase, lowercase and special character
  • contain at least one digit
  • only contain alphanumeric characters or ~!@#$%^&*()_-+=?.

For more information explaining how we use your information please see our privacy policy.

By registering you agree with our terms and conditions.

There are increased instances of cyber-criminals developing new and sophisticated techniques for the sole purpose of duping users and extorting money or information, and many of these are common phishing techniques founded on impersonation, or fake sender identity.

Whether it is emails from “the World Health Organization” urging you to take action, or an email from “your CEO” asking for gift cards or donations, fraudsters prey on empathy, sympathy, and humans’ tendency to act and react.
 
In this webinar, we will look at how phishing attacks can be detected and prevented, and how to focus your defenses on a sender identity approach.
 
Key takeaways:
 

  • The nuances of “automated phishing” 
  • Why user awareness training isn’t enough to defend your organization and prevent losses
  • How authenticating “whom” is sending is the key to defining email security policies and protecting your organization
  • Defending against phishing and Business Email Compromise (BEC) attacks

Speakers

Photo of David Appelbaum

David Appelbaum

CMO, Valimail

Photo of Peter Cassidy

Peter Cassidy

Co-founder and secretary general of the APWG

Brought to you by

Should you watch this webinar your information may be shared with the sponsors indicated above. Please see Infosecurity Magazine’s privacy policy for more information.