Phishing continues to be one of the fastest growing and malicious threats to security of industries of every kind—from financial organizations to government contractors to healthcare firms. Today’s savvy phisher manages to evade even the most sophisticated safeguards through carefully planned, socially-engineered email phishing attacks that are only getting more advanced.

In this session, we will review the key findings and insights from the Wombat Security annual State of the Phish Report:

  • Aggregation and analysis of data from tens of millions of simulated phishing attacks sent through Wombat’s Security Education Platform over a 12-month period

  • Analysis of more than 10,000 responses from quarterly surveys of infosec professionals from more than 16 industries, as well as data from an international survey of working adults who were queried about social engineering threats and their cybersecurity behaviors

  • Insights into current vulnerabilities, industry-specific phishing metrics, and emerging threats

Be sure to submit your questions for our experts when you register.

Our new platform is mobile friendly. Check out the live or on-demand sessions on the go!

Generously Supported By:

supported by logo
Speakers
speaker photo
Amy Baker
Vice President of Marketing, Wombat Security Technologies

Amy Baker, Vice President of Marketing at Wombat Security Technologies has been in the information technology and security industry for almost 20 years and has been specifically focused on info security awareness and training for the last several years. Amy led the development of Wombat’s Best Practices Methodology for Security Education programs and along with her team drives the enhancement of their security education software. She has presented at Gartner Security and Risk Management summits, ISSA, ISACA, eCrime Congress, SecureWorld, and Security Current.

speaker photo
John Kveragas, JR. CPA, CISA
Chief Audit Executive, Zenbanx

John Kveragas is a seasoned Internal Audit executive with over 20 years’ experience in IT, operational, financial, and compliance auditing in multiple industries.  John has extensive expertise with building effective internal audit functions, training and development, and managing regulatory exams with positive outcomes for financial institutions ranging from FinTech startups to Top 10 banks.  John is a frequent speaker for ISACA, The Institute of Internal Auditors, and Secure World Expo on the topics of Internal Audit, Information Security, and Compliance.

speaker photo
Sandy Bacik
Senior Compliance and Cyber Security Auditor, CipherTechs

Sandy Bacik, CipherTechs Senior Compliance and Cyber Security Auditor, has over 20 years’ direct information security experience in the areas of IT Audit and Compliance, BCP/DR, Incident Response, Physical security, Privacy, Regulatory Compliance and Audit, Policies/Procedures, Operations, and Management. With an additional 15 years in Information Technology Operations.  She has managed, architected and implemented information assurance programs in a variety of environments and developed methodologies for assessments, audits, and security policy writing. She has performed and managed engagements for a variety of assessment type to ensure corporate compliance. Ms. Bacik has been heavily involved with local, national, and international security industry events.  Ms. Bacik is the author of Building an Effective Security Policy Architecture (2008) and a contributing author to the Information Security Management Handbook (2009, 2010, 2011, 2012, 2013) and a member of the SecureWorldExpo Advisory Council.