As you know, impostor email continues to be a challenge for most security professionals. We are going to discuss the tactics and targets of impostor email via this Email Fraud Workshop breakout. Denis Ryan, Sr. Director of Email Fraud at Proofpoint, will discuss:
The email threat landscape;
How to identify potential...
2018 has been an important year in Canada from a cybersecurity and privacy standpoint. The introduction of Canada's new National Cybersecurity Strategy in June of this year along with the upcoming mandatory breach notification requirements effective November 1, 2018 are just the tip of the iceberg. In a complex world...
What does a targeted attack really look like? How can you effectively defend your organization? What does it take to recover from a headline-grabbing breach and rebuild trust with your customers?
Join Matthew Maglieri, CISO of Ashley Madison's parent company Ruby Life Inc. and ex-Mandiant consultant, as he presents...
When it comes to fraud prevention, many organizations overlook the insider threat - both the malicious actor who intends to commit fraud, as well as the accidental insider who makes a mistake or is taken advantage of by an external entity? The CERT Insider Threat Center at Carnegie Mellon University is one of the...
"Know your customer" is a familiar refrain in business circles. But as threat actors grow in number, sophistication and cross-channel schemes, it is increasingly important for organizations to also have a clear picture of their potential attackers - whether they are nation states, cybercrime gangs or lone actors. Join...
An in-depth look at the frequency, magnitude, and manner in which modern enterprise networks change and the risks these changes pose, across all F100 FSI organizations. We highlight different technological and organization processes, such as M&A events, cloud migration, IoT deployment, and network misconfigurations...
Open source and third-party components help developers build and deploy applications faster. But with increased speed comes greater risk. Vulnerabilities in components are a hidden cost of free software. And their widespread use creates opportunities for attackers looking to exploit the most possible victims by...
The University of Toronto has been impersonated over a dozen times in the past two and a half years in a somewhat sophisticated scam designed to steal goods to order. This presentation will detail how the scam works (with examples!), talk about some of the mitigating actions that have been performed, as well as some...
Recent apparent hack attacks against Canadian banks, the sentencing of a Canadian for helping enable the Yahoo breach, and the Equifax breach's impact in Canada all point to the need to be more aggressive in ramping up cybersecurity efforts in light of emerging threats.
Protecting data has become more challenging as...
In the wake of recent ransomware attacks, such as WannaCry, which have plagued organizations for the last year, what lessons do we have yet to learn? The widespread WannaCry attacks were not particularly sophisticated or stealth. So why did they have such an impact?
In this session, panelists discuss why the "wartime...
Too many organizations continue to address breach response from a reactive mode - having a crude disaster-recovery plan in place in case something "does" happen, rather than accepting that something "will" happen and proactively preparing for it. In this session, a panel of legal, technical and law enforcement experts...
The European Union's General Data Protection Regulation has been the buzz of 2017, and security leaders globally understand the regulation's basics, including the 72-hour breach reporting mandate, the May 2018 enforcement date and the noncompliance penalty of up to 4 percent of annual global revenue or 20 million...
Will the Equifax breach be a game changer, or just another big-name security mishap that slowly fades away out of collective memory? Does this massive breach have the potential to be the incident that leads to sweeping regulatory changes, when it comes to credit bureaus and data collectors like Equifax? If so, what...
Implementing clouds in heavily regulated environments is either unscalable and slow, because of legacy audit requirements and processes, or simply implemented without audit controls. While these may seem like acceptable risks, the 20 million euro minimum penalty under GDPR, and the threat of blanket ransomware...
Organizations of all sizes today face serious and consequential risk management challenges. Technology is often presented as the ultimate solution. But in many cases, organizations are experiencing not just a technical challenge, but a "language" challenge, especially when it comes to risk management communication...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.