Phishing continues to be one of the fastest growing and most malicious threats to the security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most significant safeguards through carefully planned, socially-engineered email phishing attacks, and is only getting more advanced.

In fact, the Anti-Phishing Working Group observed more phishing attacks in the first quarter of 2016 than any in other three-month span since 2004, and reported a 250% increase in phishing websites between March 2015 and October 2016. And people—your internal users—are the largest and most vulnerable point of entry. 

In this session, we will review high-level findings and insights from the Wombat Security annual State of the Phish Report, which focuses on two different sets of data:

  • Anonymous data aggregated across our customer base, involving millions of mock phishing attacks sent through Wombat’s Security Education Platform.
  • An extensive survey of information security professionals from our database on the different phishing threats they face and how they are protecting themselves.

You will learn about:

  • Where — and how — organizations make themselves most vulnerable to phishing attacks
  • How and why end users are vulnerable to phishing and how to address the problem
  • What your peers are doing, whether it is working, and what you should be doing
  • Data and analysis of click and open rates from millions of simulated email phishing campaigns, outlined by organization size and vertical.

Generously Supported By:

supported by logo
Speakers
speaker photo
Trevor Hawthorn
Chief Technology Officer, Wombat Security Technologies

Trevor joined the Wombat team in October 2015 with the acquisition of ThreatSim , where he was co-founder and CTO.  Trevor has a technical and hands-on background, with over eighteen years of information security experience in both consulting and enterprise security across a wide-range of industries. Besides being a regular presenter to the FBI NIPC classes at Quantico, VA, he has held positions at Earthlink, UUNET, Cybertrust (now Verizon Enterprise Security Solutions), and in 2005 co-founded Stratum Security, a security consulting boutique where ThreatSim was developed.

speaker photo
Jake Bernstein
Attorney, Newman Du Wors, LLP

Jake is a former Washington State Assistant Attorney General who now represents companies subject to investigations and actions brought by federal and state regulatory agencies, including the FTC and state attorneys general. He provides privileged cybersecurity assessments and strategic planning in addition to advertising, marketing, regulatory compliance, and privacy advice.

speaker photo
Mitch Parker
Executive Director Information Security & Compliance, Indiana University Health

Mitchell Parker, CISSP, is the Executive Director of Information Security and Compliance at IU Health.  Previous to this job, he was the CISO at Temple Health, an academic health system in Philadelphia, PA.  Mitch has done a significant amount of work in researching the effects of cloud computing, network-based threats, compliance, and privacy and security requirements on connected health devices.  While he was at Temple, Mitch worked collaboratively with a number of EMR and biomedical equipment vendors to improve their security postures and provide a better quality of service.  He currently resides in Carmel, IN, with his wife, two children, and two cats.