Communications Security: Who Is On The Other End Of The Line?

Episode-XXI-Communications-Security-Who-Is-On-The-Other-End-Of-The-Line.jpg

Theme: Removing the Mystery

#19 | Unraveling Risk: No Rocket Science Required
#20 | Third-Party (Vendor and Supplier) Risk Management 
#21 | Digging Deeper: Types of Hackers


A Cybersecurity Webinar For SMBs | Episode XXI

Email and text messaging, among other text-based communications methods, have become second nature; we receive and process so much information from so many sources, we tend to approach this activity with a sense of robotic automation. Unfortunately, cybercriminals take advantage of this state of mind, and try to trick us into doing things we shouldn’t. And, in some cases, cybercriminals spoof these messages, making them appear as though they are coming from your organization.

Join experts in the field for this need-to-know webcast to learn best practices around:

Communications as a Threat Vector: How Cybercriminals Manipulate This Channel
The Risks Associated With Spoofed or Compromised Communications
Implementing Protections, Controls, and Monitoring To Address This Threat

 

STAY TUNED FOR THE RECORDED SESSION

This video qualifies for 1 CPE. Learn more.

Offical+ISC2+CPE+credits+Submitter+V2.jpg

Video coming soon…

On The Go? Have A Podcast...

Coming soon…



Educators

Lost-in-Space.png

TBA

TBD

TBD

James-Stanger.png

TBA

TBD

TBD

Lost-in-Space.png

TBA

TBD

TBD


Moderator

 
 

Sean Martin, CISSP

Editor-in-Chief
ITSPmagazine

 

This webcast is part of a series of SMB cybersecurity webcasts on ITSPmagazine.
Sign up for the newsletter to get notified of future events.