BEC Attack

Discover the latest collection of talks and videos on BEC Attack from industry experts.

Attend Summits on BEC Attack

The 2024 Threatscape

The 2024 Threatscape

Organizations must prepare for increasingly sophisticated and costly cybersecurity risks in the year ahead. While traditional methods of attack, such as
ransomware, malware, and email phishing, will persist, security strategies must now address emerging concerns like the growing prevalence of AI and the …

|15 sessions
Securing the Cloud Ecosystem

Securing the Cloud Ecosystem

Protect your cloud infrastructure, assets and data with effective technologies, policies and other services to ensure threats stay at bay.

|13 sessions
Enabling Threat Detection and Response

Enabling Threat Detection and Response

Detect and prevent the most pervasive cyber threats with these expert tips and proven success strategies

|19 sessions
Next-Gen Strategies for Securing the Network in 2022

Next-Gen Strategies for Securing the Network in 2022

According to a 2021 study by the Ponemon Institute, 68% of organizations experienced one or more endpoint attacks that successfully compromised data
and/or IT infrastructure in the last 12 months. Coupled with the rise of zero trust meaning that endpoint security is becoming even more critical, it’s safe to …

|16 sessions
The 2025 Threatscape

The 2025 Threatscape

While traditional methods of attack such as ransomware, malware, and email phishing will persist, security strategies must now address emerging concerns
like the growing prevalence of AI and the near-universal employee use of mobile and IoT devices. Attend this Summit to gain insights from renowned indu…

|19 sessions

Watch series about BEC Attack

Break the Attack Chain: Strengthening Defenses and Safeguarding People and Data
3 episodes
Series Company Logo

Break the Attack Chain: Strengthening Defenses and Safeguarding People and Data

People are the primary targets of today’s advanced attacks. But most organizations aren’t centering their security strategy around their people. It is critical
to align protection with risks targeting users throughout the attack chain—from initial compromise to lateral movement to impact. In this three-part webina…

Watch series

Week in security with Tony Anscombe
51 episodes
Series Company Logo

Week in security with Tony Anscombe

Hear from ESET's Chief Security Evangelist Tony Anscombe about the latest news in cybersecurity

Watch series

School of Phish Master's Program
6 episodes
Series Company Logo

School of Phish Master's Program

Cloud Computing impacts just about everything we are experiencing today, from technology innovations to business operations to how we live and digitally
interact with everyone. But all that convenience has a dark side too. Being connected makes us vulnerable. Every different connection creates opportunitie…

Watch series

School of Phish Master’s Program
6 episodes
Series Company Logo

School of Phish Master’s Program

Cloud Computing impacts just about everything we are experiencing today, from technology innovations to business operations to how we live and digitally
interact with everyone. But all that convenience has a dark side too. Being connected makes us vulnerable. Every different connection creates opportunitie…

Watch series

CISO Hero Stories
7 episodes
Series Company Logo

CISO Hero Stories

Can we agree that in today’s evolving threat landscape, the role of a CISO has become critical for every organization? CISOs serve as the linchpin in your
organization's efforts to safeguard its digital assets, workforce, and reputation. Yet, even with this incredible responsibility, it just takes one cyberattack to m…

Watch series

Secureworks Global Threat Intelligence Summit 2024
11 episodes
Series Company Logo

Secureworks Global Threat Intelligence Summit 2024

The threat landscape is as resilient as ever. Tune into a wide range of topics led by global cybersecurity experts to understand emerging threats and how to
combat today’s adversaries. Tune into a wide range of topics led by global cybersecurity experts to understand emerging threats and how to combat today’…

Watch series