CEO or Cybercriminal? Protecting Your Organization from Phishing & Other Threats Out of Stock
OnDemand
Ratings |
|
Standard Price | |
Member Price | |
Size | |
Color | |
Qty |
Product Details
About the Seminar
No one wants to be the next company in the headlines for a data breach. By and large, these attacks start with phishing – someone in the organization gets a crafty phishing email…seemingly from their CEO or HR department, they click on it, and it all goes downhill from there. Studies show that at least 1 out of every 5 of you would fall victim to a given phishing attack. And that single email unleashes destructive malware into the systems of an organization depleting the organization of time, resources, capital, and often most painfully, reputation.
But, great news…you can protect yourself and your organization, and fight back against phishing.
This presentation will explore the social engineering tactics used by threat actors to lure users to click on malicious content. It will also focus on the key aspects of a successful employee defense training solution. Successful programs include several key components: raising organizational awareness, assessment, a consistent delivered and diverse phishing program, education and training, and sophisticated metrics that paint a revealing picture of the layered strengths and weaknesses of an organization.
No one wants to be the next company in the headlines for a data breach. By and large, these attacks start with phishing – someone in the organization gets a crafty phishing email…seemingly from their CEO or HR department, they click on it, and it all goes downhill from there. Studies show that at least 1 out of every 5 of you would fall victim to a given phishing attack. And that single email unleashes destructive malware into the systems of an organization depleting the organization of time, resources, capital, and often most painfully, reputation.
But, great news…you can protect yourself and your organization, and fight back against phishing.
This presentation will explore the social engineering tactics used by threat actors to lure users to click on malicious content. It will also focus on the key aspects of a successful employee defense training solution. Successful programs include several key components: raising organizational awareness, assessment, a consistent delivered and diverse phishing program, education and training, and sophisticated metrics that paint a revealing picture of the layered strengths and weaknesses of an organization.
This seminar qualifies for 1.0 MCLE credit hours.
This is an Intermediate Level Program.
Note: When submitting your compliance reports to the SC Commission on CLE and Specialization, if you completed this in 2020, please use this course code: 201185ADO