Phishing has long been a headline threat for InfoSec teams—but email is just one entry point for cybercriminals. Webinar attendees will learn why it’s important to assess and train their end users about cybersecurity threats beyond email-based social engineering.

During this session, we will share results from the Wombat Security 2018 Beyond the Phish® Report, which analyzes data from nearly 85 million responses to cybersecurity knowledge assessments and training challenges presented to global end users across multiple industries during 2017. We will discuss end users’ strengths and weaknesses across 12 cybersecurity topics—from identifying social engineering scams to protecting confidential information to working safely outside the office. We’ll also highlight variations in end-user knowledge levels across industries, giving you a benchmark against which to compare your organization’s readiness.

Attendees will also see how data insights from knowledge assessments and training activities differ from those related to simulated phishing attacks, and how using these tools together can give a more complete view of susceptibility. Finally, we’ll provide guidance about how to use this information to strengthen your end users and reduce the risk of successful cyberattacks within your organization.

Join our experts as we dive into the report and share best practices and pitfalls as we try to create a culture of security within our organizations and community.

Be sure to submit your questions for our experts when you register.

Our new platform is mobile friendly. Check out the live or on-demand sessions on the go!

Generously Supported By:

supported by logo
speaker photo
Victoria L. Thomas
Cybersecurity Awareness Leader, Fortune 500 Company

Design, develop and execute a world-class, global information security awareness program from concept to implementation that increases employee understanding and fosters behavioral change.

Establish program's vision, mission and long-term brand positioning and demand generation strategies to drive adoption of information protection behaviors, as well as build brand equity and increase brand loyalty among the target audience totaling 50,000 worldwide.

Collect, aggregate and report on data-driven metrics to identify and prioritize key end user learning to reduce threat vulnerabilities, and mitigate human risk against information loss, theft, and unauthorized access and disclosure.

speaker photo
Amy Baker
VP Marketing, Wombat Security Technologies
Amy has been in the information technology and security industry for almost 20 years and has been specifically focused on info security awareness and training for the last several years. Amy led the development of Wombat’s Best Practices Methodology for Security Education programs and along with her team drives the enhancement of their security education software. She has presented at Gartner Security and Risk Management summits, ISSA, ISACA, eCrime Congress, SecureWorld, and Security Current.
speaker photo
Mitch Parker
Executive Director, Information Security and Compliance, Indiana University Health
Mitchell Parker, CISSP, is the Executive Director of Information Security and Compliance at IU Health.  Previous to this job, he was the CISO at Temple Health, an academic health system in Philadelphia, PA.  Mitch has done a significant amount of work in researching the effects of cloud computing, network-based threats, compliance, and privacy and security requirements on connected health devices.  While he was at Temple, Mitch worked collaboratively with a number of EMR and biomedical equipment vendors to improve their security postures and provide a better quality of service.  He currently resides in Carmel, IN, with his wife, two children, and two cats.
speaker photo
James McQuiggan
Product & Solution Security Officer, Siemens Gamesa

James R. McQuiggan, CISSP is a cyber security expert in the Central Florida area. He is the Product & Solutions Security Officer of the Service Americas division at Siemens Gamesa Renewable Energy.  He is responsible for the developing the strategy and policies for securing the SCADA products deployed to America’s customers.  With over 16 years at Siemens, James has consulted and supported various corporate divisions on cybersecurity standards, information security awareness and securing their networks.  His previous position at Siemens in the Information Security group, he implemented the phishing program that assessed the Siemens US employees Energy division ability to “be thinkers and not clickers”

James has been an (ISC)2 member since 2008 and a volunteer of the Safe and Secure Online Program for the Center for Cyber Education & Safety.  Since 2011, he has volunteered and taught their Safe & Secure Online education and awareness program.  Over 7,000 students, parents, teachers and the “life experienced” (seniors) in the greater Orlando region have learned about cyber safety, cyber ethics, cybersecurity, and digital citizenship. He is a member of the North American Advisory Council (NAAC) and within the Central Florida community he has been President of the Central Florida ISSA chapter and is now the President of the Central Florida (ISC) 2 chapter.  He is the recipient of the 2016 (ISC)2 President’s Award for his valuable contributions toward advancing the information security profession. 

James is the father of two teenage daughters and continues to make sure they are safe and secure online while using their smartphones and social media.