Theme: Removing the Mystery
#19 | Unraveling Risk: No Rocket Science Required
#20 | Third-Party (Vendor and Supplier) Risk Management
#21 | Digging Deeper: Types of Hackers
A Cybersecurity Webinar For SMBs | Episode XXI
Email and text messaging, among other text-based communications methods, have become second nature; we receive and process so much information from so many sources, we tend to approach this activity with a sense of robotic automation. Unfortunately, cybercriminals take advantage of this state of mind, and try to trick us into doing things we shouldn’t. And, in some cases, cybercriminals spoof these messages, making them appear as though they are coming from your organization.
Join experts in the field for this need-to-know webcast to learn best practices around:
Communications as a Threat Vector: How Cybercriminals Manipulate This Channel
The Risks Associated With Spoofed or Compromised Communications
Implementing Protections, Controls, and Monitoring To Address This Threat
STAY TUNED FOR THE RECORDED SESSION
This video qualifies for 1 CPE. Learn more.
Video coming soon…
On The Go? Have A Podcast...
Sean Martin, CISSP