How Cyber Attackers Research Your Organization, And What To Do About It Thursday, July 13, 2017 | 11AM PT / 2PM ET
For most online criminals, the first step in a major attack is to do research on the target organization. This “reconnaissance” may involve sending fake emails to employees, stalking executives on social media, making fraudulent phone calls, or other social engineering techniques that might yield credentials or help lay the groundwork for a more sophisticated attack. How do you know when your organization is the target of this type of reconnaissance – and what can you do to disrupt it? In this eye-opening webinar, you’ll learn how attackers can take advantage of your website, employees’ social media, and other vehicles to learn about your organization – and get the ammunition they need to convince your end users to trust them. Attend this webinar and get: Real examples of how attackers gather intel and use it to launch convincing phishing exploits Best practices for disrupting attackers’ online reconnaissance methods Ways to enhance your staff’s cybersecurity awareness, so they are more aware of reconnaissance, less susceptible to social engineering Webinar Sponsored by: Privacy Policy |
|
|
|
You are subscribed as [email protected] You are receiving this email because you provided UBM with your email address. To opt-out of any future Webcasts offer from Dark Reading please click here. PRIVACY NOTICE UBM takes your privacy seriously. To learn more, please read our Privacy Policy FOR FURTHER COMMUNICATION, PLEASE CONTACT: Customer Service UBM Americas 2 Penn Plaza, 15th Floor New York, NY 10121 | |
|
|
|
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -