The number of ransomware attacks quadrupled in 2016 and is expected to double again in 2017, according to findings in a report from large insurer Beazley. They suggested that organizations appear to be particularly vulnerable to attacks during IT system freezes, at the end of financial quarters, and during busy shopping periods.

Hackers are more resourceful than ever, using social engineering to aid them in creating more believable phishing emails and CEO fraud attacks—even dropping USB sticks in and around businesses. 

In this web conference, our experts will:

  • Give real life examples of socially engineered attacks

  • Discuss legal ramifications you should be aware of

  • Provide ideas on what you can start doing now, such as mobilizing your end users as your last line of defense to help ensure you aren't the next victim

Be sure to submit your questions during registration to get the answers you need.

Generously Supported By:

supported by logo
Speakers
speaker photo
Erich Kron
Security Awareness Advocate, KnowBe4

Erich Kron is a veteran information security professional with over 18 years’ experience in the medical, aerospace manufacturing and defense fields. He is the former security manager for the 2nd Regional Cyber Center-Western Hemisphere and holds CISSP, CISSP-ISSAP, MCITP, CCENT and ITIL v3 certifications, among others. He has managed the technical integration and functional testing of multi-million-dollar enterprise level technology projects within the Department of Defense, as well as large military security programs. Erich has worked with information security professionals around the world to provide the tools, training and educational opportunities to succeed in the InfoSec industry. 

speaker photo
George Finney
Chief Security Officer, Southern Methodist University

George Finney is the Chief Information Security and Director of Digital Interests for Southern Methodist University in Dallas, Texas and is the author of the Cybersecurity book, No More Magic Wands. Mr. Finney received his Juris Doctorate at Southern Methodist University's Dedman School of Law and is a licensed attorney. Mr. Finney is working to transform the IT Security and Compliance at the University through streamlining technology controls, increasing Regulatory Awareness, overseeing the IT Contracts process, implementing a vendor management program, as well as advocacy for Open Source software and processes. He has written a number of papers and presentations on Information Security and Software Licensing. He maintains a number of Industry credentials, including the Certified Information Security Systems Professional and a Certified Information Privacy Professional. Mr. Finney earned a bachelor of arts degree in liberal arts in 1999 from St. John's College in Santa Fe.

speaker photo
Joan Antokol
Managing Partner, Privacy and Data Protection Practice, Park Legal LLC

Joan Antokol is internationally recognized for her work in data protection. She is the founder and managing partner of Park Legal LLC, a data protection law firm with offices in Indianapolis and New Jersey. Joan is a member of the International Working Group on Data Protection in Telecommunications, a data protection regulator group chaired by the Berlin Data Protection Commissioner, and is also a Privacy by Design Ambassador appointed by the former Ontario, Canada Privacy Commissioner. Previously, Joan was a partner at and chaired the privacy and security practice group at an international law firm and also served as Vice President and Global Privacy Officer for a Fortune 100 pharmaceutical company for 7 years.

Moderator
speaker photo
Andrew Bennett
Advisory Director for Center of Excellence in Digital Forensics, Sam Houston State University
Andy is a native Texan with nearly 20 years of experience in IT, DF, and Cyber Security Issues. He is passionate about security works every day as the Director of the Center of Excellence in Digital Forensics to share that passion with others.