Find out the most effective ways to defend against social engineering attacks.
Register Today
Understanding and Preventing Social Engineering Attacks
Wednesday, February 20, 2019 | 10AM PT / 1PM ET

John, while cyber attackers continually develop more sophisticated methods for penetrating enterprise computing systems, most exploits begin with a simple step: fooling users into breaking security policy. These "social engineering" attacks – including phishing, "watering holes", and social network attacks – are designed to trick your users into giving up passwords, opening malicious email attachments, or installing malware.

How can enterprises prevent "social engineering" attacks? Can users be trained to recognize such exploits and avoid them? Join Dark Reading as we invite top experts to discuss the most effective methods of defending against social engineering attacks.

When you attend this webinar, you'll learn:

  • New Tricks social engineers' are using and be briefed on how they are still hurting enterprises hard using the oldest tricks in the book
  • Techniques, training, and technologies that can bolster your defenses against social engineering attacks
  • How new technologies are changing the nature and methods of social engineering

Register and attend to learn how social engineering works, and how to recognize it in action, before it's too late!

Register Now


Webinar Sponsored by:

Privacy Policy
Featured Speakers

Chris Hadnagy
Founder & CEO
Social-Engineer, Inc.

Jan Liband
Chief Marketing and Strategy Officer
SlashNext

Sara Peters
Senior Editor
Dark Reading

Having trouble viewing this email? View Web Version
You are subscribed as newsletter@newslettercollector.com

To opt-out of any future Webcasts offer from Dark Reading please click here.

PRIVACY NOTICE
UBM takes your privacy seriously.
To learn more, please read our
Privacy Policy

FOR FURTHER COMMUNICATION, PLEASE CONTACT:
Customer Service
UBM Americas
2 Penn Plaza, 15th Floor
New York, NY 10121

UBM
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -