Video On Demand
The Confidence Game: How Attackers Exploit People and How to Stop Them
Ryan Kalember
Ryan Kalember
Runtime: 34:27
Brought to you by:
Phishing and social engineering attacks are the ways most organizations get compromised, and the vast majority of malware is human-activated. However, most organizations don't know who among their employees may be receiving sophisticated threats, targeted threats or even large volumes of threats. These targets are called VAPs (Very Attacked People), and they may not be who you would expect. In this session, you will learn how to identify who’s being attacked in your organization, how to protect them better and how to leverage data to better understand your adversaries. You will also learn how Proofpoint’s integration with CrowdStrike provides unparalleled protection to 150+ enterprises’ employees and their endpoints.

Related Videos

Security Strategy, Architecture & Operations Frictionless Zero Trust
Multiple Speakers CrowdStrike 18:01
Security Strategy, Architecture & Operations Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Multiple Speakers Consortium networks 13:14
Security Strategy, Architecture & Operations How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Doug Clifton EY 30:25