Contact Us   |   Print Page   |   Sign In   |   Join Now
ISSA Thought Leadership Series: Beyond the Phish - A Snapshot of End-User Behavior
Tell a Friend About This EventTell a Friend
ISSA Thought Leadership Series: Beyond the Phish - A Snapshot of End-User Behavior

Beyond the Phish: A Snapshot of End-User Behavior

8/14/2019
When: Wednesday, August 14, 2019
1:00 PM
Where: United States
Contact: Sean Bakke

« Go to Upcoming Event List  

Phishing is one of InfoSec's longstanding threats. But for cyber criminals, email is just one entry point of many. How can you better prepare you and other end users in your organization for cyber security threats beyond email-based social engineering?

During this session, we will share results from the Proofpoint’s Beyond the Phish® Report, which examines end-user understanding of a broad range of cyber security topics and best practices. The report features analysis of data related to nearly 130 million cyber security questions and offers insights into employee knowledge levels across 14 categories, 16 industries, and more than 20 commonly used department classifications.

We’ll share:

- The importance of assessing and training end users about cyber security threats beyond email-based social engineering
- The strengths and weaknesses among end users across 14 cyber security topics, highlighting how end-user knowledge levels vary across industries
- A more holistic view of susceptibility by looking beyond knowledge assessments and training activities
- How you can use this information to reduce the risk of successful cyber attacks within your organization

Join our experts as we dive into the report and share best practices and pitfalls as we stimulate a stronger security culture.

 

CLICK HERE TO REGISTER


Community Search
Sign In


Calendar

1/22/2020
ISSA Thought Leadership Series: The Asset Management Resurgence

2/22/2020 » 2/23/2020
February 2020 ISSA Cyber Executive Forum San Francisco, CA




Copyright © 2016, Information Systems Security Association, All Rights Reserved
Privacy PolicyCopyright Information
This website uses cookies to store information on your computer. Some of these cookies are used for visitor analysis, others are essential to making our site function properly and improve the user experience. By using this site, you consent to the placement of these cookies. Click Accept to consent and dismiss this message or Deny to leave this website. Read our Privacy Statement for more.