Sophisticated criminals and state-sponsored actors rely on various phishing techniques to harvest sensitive data, steal credentials or deploy malware. Far too many companies and employees think phishing lures are obvious and easy to spot. Sophisticated cyber campaigns use previously stolen insider information and credentials to create legitimate-looking requests that appear to come from industry colleagues. Join security expert and author, Mark Sangster and threat intelligence veteran, Kevin O’Connor as they review emerging threats and attack techniques, and unpack the latest exploitations, and growing trends in the threat landscape.
What You Will Learn
- Explore the latest phishing trends and tactics
- Expand your ability to identify suspicious activity and report it
- Build defenses to protect your employees in the office and their homework environments