Despite their efforts, from phishing simulations to security awareness campaigns, CISOs from organizations big and small keep falling short when it comes to stopping Business Email Compromise (BEC) attacks. But, if everyone has an email security program, why are the losses associated with BEC still climbing? Join this boardroom hosted by Abnormal Security to discuss:
What is working, or not working, with existing processes and technology?
How do we solve the "human factor" in the equation?
Best practices for preventing loss related to a BEC attack?
Executive boardrooms are intimate and interactive sessions designed to foster dynamic dialogue around a specific, strategic topic. These private, closed-door discussions encourage attendee participation and are limited to 15 attendees, with seating priority given to CISOs.
To reserve your seat, please contact: Samantha Flaherty, San Francisco CISO Program Manager, at email@example.com.
Headed to the HEALTH ISAC Spring Americas Summit? We'd love to see you!
Meet with Abnormal Security at Booth 40 to chat about how the email security landscape is changing for healthcare organizations. We'll show you which types of attacks are most likely to target you, and what you can do about them.
Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations. Gain the latest knowledge you need to enable applications while keeping your computing environment secure from advanced Cyber Threats. Demo the newest technology, and interact with the world’s security leaders and gain other pressing topics of interest to the information security community. The FutureCon community will keep you updated on the future of the Cyberworld and allow you to interact with your peers and the world’s security leaders.
Government Technology's passion is promoting best practices and spurring innovation in the public sector – more important than ever in challenging times like these. Please join us for a powerful series of sessions that provide inspiration, participation, education, and thought-provocation!
The New York Forum is designed for information security practitioners across all industries to dive deep on specific topics, share insights, and network with peers. This one-day event incorporates breakouts with IANS Faculty, spotlight sessions on emerging technologies, and opportunities to network with your peers. Topics fall into five tracks:
- Security Operations
- Security Architecture
- Threats and Vulnerabilities
- Governance, Risk Management, and Compliance
- Leadership and Career Development
IANS Forum content is geared toward the entire security function. Attendees include but are not limited to CISOs, VPs and Managing Directors of Information Security, Information Security Architects, and Information Security Engineers.
Join Abnormal Security at SecurityWeek's Threat Hunting Summit and catch Crane Hassold present "Understanding the Full BEC Attack Cycle Using Active Defense" at 11:30am EST.
This presentation will cover how active defense techniques can be used as a unique tool to collect intelligence that helps us better understand the full cycle of BEC attacks by revealing what happens after a potential attack is successful. We’ll look at the different types of investigative artifacts we can collect by engaging with BEC actors, from post-attack behavior to attacker locations to mule accounts. Throughout the presentation, we’ll see various real-world examples of successful active defense engagements that have led to significant insights into these attacks.
SecurityWeek’s 2022 Threat Hunting Summit will present innovative strategies and tools that security teams use to detect, contain, and eliminate attackers present in or attempting to infiltrate enterprise networks. Attendees will learn how continually monitoring with a fine-tuned threat hunting strategy can help incident response teams detect attacks that may have bypassed enterprise defenses and reduce attacker dwell time.
Get together with New York's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers. Join your peers to discuss the most critical issues impacting CISOs today.
Get together with Houston's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers. Join your peers to discuss the most critical issues impacting CISOs today.
Get together with Minneapolis's top CISOs to tackle shared business challenges and critical priorities facing your role today. Participate in this one-day, local program with peer-driven topics and interactive discussions with your true C-level peers. Join your peers to discuss the most critical issues impacting CISOs today.