The Confidence Game: How Attackers Exploit People and How to Stop Them
Ryan Kalember
Runtime: 34:27
Phishing and social engineering attacks are the ways most organizations get compromised, and the vast majority of malware is human-activated. However, most organizations don't know who among their employees may be receiving sophisticated threats, targeted threats or even large volumes of threats. These targets are called VAPs (Very Attacked People), and they may not be who you would expect. In this session, you will learn how to identify who’s being attacked in your organization, how to protect them better and how to leverage data to better understand your adversaries. You will also learn how Proofpoint’s integration with CrowdStrike provides unparalleled protection to 150+ enterprises’ employees and their endpoints.
Please provide your feedback and be entered to win $300 on items from the CrowdStrike Swag Store! Winner will be contacted via email.
Related Videos
Frictionless Zero Trust
Security Strategy, Architecture & Operations
Frictionless Zero Trust
Multiple Speakers
CrowdStrike
18:01
Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Security Strategy, Architecture & Operations
Metrics That Matter: From SecOps to the Boardroom – Explaining the Risk & Impact on the Company so Everyone Understands
Multiple Speakers
Consortium networks
13:14
How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Security Strategy, Architecture & Operations
How Does OT Security Evolve from Bolted On to Built In? Bridging the Relationship Gap to Build a Business-aligned OT Security Program
Doug Clifton
EY
30:25
{Will be replaced by the modal content}