Don't Get Cyber Snagged: Recognizing and Reporting Suspicious Activity

Event details:

Thursday, October 20, 2022
On-Demand Webinar

Presenters:

Mark Sangster, Chief of Strategy at Adlumin
Kevin O’Connor, Director of Threat Research at Adlumin

About this talk:

Sophisticated criminals and state-sponsored actors rely on various phishing techniques to harvest sensitive data, steal credentials or deploy malware. Far too many companies and employees think phishing lures are obvious and easy to spot. Sophisticated cyber campaigns use previously stolen insider information and credentials to create legitimate-looking requests that appear to come from industry colleagues.

Watch industry expert and author Mark Sangster and Director of Threat Research Kevin O’Connor as they review emerging threats and attack techniques, unpack the latest exploitations, and discuss growing trends in the threat landscape.

What you will learn:

  • The latest phishing trends and tactics
  • How to identify suspicious activity and report it
  • How to build defenses to protect your employees in their office and home environments


Cybersecurity and AI: Managing the Evolution of the Threatscape

Event details:

Wednesday, September 21, 2022
On-Demand Webinar

Presenters:

Mark Sangster, Chief of Strategy at Adlumin
Diana Kelley, Chief Security Officer at Cybrize
Erick Galinkin, Principal Researcher at Rapid7
Nash Borges, VP of Engineering and Data Science at Secureworks

About this talk:

According to research by Capgemini, two-thirds of businesses now understand that AI is a necessary component in the race to secure your organization. The attack surface in 2022 is larger and more sophisticated than ever, with ransomware and breaches at an all-time high. The ability to detect cyber threats quickly, to have proactive security measures, and detect new, malicious threats, is more critical than ever.

In this month’s episode of ‘The (Security) Balancing Act,’ we ask, “Is AI the answer to the evolution of the threatscape?”

Watch on-demand as we discuss the following:

  • Use cases for AI in cyber – where does it fit?
  • Can AI replace cyber analysts?
  • What is the importance of resilient AI?
  • What do we mean by predictive intelligence and why is it important?
  • How can you implement AI into your security?
    • What technology can AI leverage to improve your security posture?
    • What is the future of AI in the cybersecurity space?