A recent Forbes article suggested data breaches globally will cost over 2 trillion in 2019, which is four times the cost seen in 2015. The latest Verizon Data Beach Investigation Report suggests that 30% of people will open on a phishing email. When analyzing these two statistics, it isn’t hard to anticipate how the cybercriminals will strike. Advanced Persistent Threats and Organized Crime groups continue to land successfully ACH and Wire frauds in community banks and against their corporate customers. In most cases, cybercriminals hook their victims with a phishing attack, as Verizon reports that 91% breaches involve phishing.
This discussion will review strong risk management processes and identify critical elements for building layered information security controls into your security program.
- Latest Phishing Examples
- Phishing Process
- Asset-based Risk Assessment approach
- Layered Security Controls
- Network Security Auditing
- Social Engineering Assessments
- Ongoing Phishing Testing
Who Should Attend?
Information Security Officer, IT Manager, Risk Officer, Internal Auditor, and Executives looking to understand phishing scams and cybercrime trends.
Please note: This site employs features that may cause unexpected behavior in older versions of Internet Explorer. If you experience a problem, try refreshing your screen. If this doesn't solve the problem, click on this link.
You may contact us by using the Online Chat button below.