New Mimecast CEO Marc van Zadelhoff talks about the integration of Elevate to manage human risk and the company's strategy for technological innovation. He also details plans for expanding Mimecast's presence in non-English-speaking markets and enhancing channel partnerships.
Cybersecurity professionals are facing an ever-growing challenge of ensuring compliance while driving strategic security initiatives across their organisations - including NIS2 and DORA. In this webinar, we will be exploring how to strategically implement new regulatory requirements as well as key methods to drive...
The clock is ticking for NIS2 and DORA compliance, and cybersecurity leaders are feeling the pressure to adapt. This upcoming session with Dr. Martin J. Kraemer will be focusing on how to integrate and comply with the new regulations - and use these as an opportunity to improve the business security posture.
We...
The United States Coast Guard in recent years has started to offer a range of cybersecurity services designed to enhance protections for the marine transportation system, but a new report reveals private sector stakeholders are reluctant to use the military branch.
To make cybersecurity a business enabler, cybersecurity teams need to focus on opening things up in a secure fashion so that the functionality and productivity of the business can flourish. Hearst's Andres Andreu discusses the areas in which this can be done.
Deepfakes are becoming an increasingly serious threat. What once began as an entertaining experiment with new technology has evolved into a sobering reality. Synthetically generated audio messages and fake videos have already led to fraud cases where millions of dollars were stolen. In one case, attackers were able to...
Deepfake cases in Germany have seen a year-on-year increase of 142% - with various contributing factors. But what can be done to properly prepare for the threat that's here already?
In this webinar, we explore:
Current capabilities of deepfake technology - from an attack vs defence perspective;
Recent case...
Old-school awareness training does not hack it anymore. Your email filters have an average 7-10% failure rate; you need a strong human firewall as your last line of defense. Join us for a live demonstration of a new-school approach to Security Awareness Training and Simulated Phishing. Find out how 65,000+...
The security awareness market has changed significantly over the past several years as security leaders now seek to ensure that any SAT program is changing user behavior and empowering their business to understand, reduce and monitor employee cyber risk.
Download this checklist to learn more on:
The 7 critical...
From Deepfakes to AI-generated phishing emails at scale, the emerging technology has become a powerful weapon in the arsenals of bad actors around the world. However, fighting back can be done with AI too.
Download the guide to learn more on:
How to harness and tailor artificial intelligence for security...
While DDoS assaults and AI-driven social engineering threats are both on the rise, the European threat landscape continues to be dominated by phishing. It is the primary cyber attack vector and principal delivery mechanism for ransomware and malware.
The result is cybersecurity leaders throughout Europe are now...
Javvad Malik, lead security awareness advocate at KnowBe4, emphasized the increasing risk posed by threat actors during election cycles - exploiting social media, posting deepfake content and disseminating misinformation. "Be skeptical of everything you see," he said.
From scams to virtual kidnappings to mind-bending mass disinformation - we've entered a new era of ease for digital deceptions. acceleration of GenAI has redefined our relationship with 'reality' and challenged the view on cybersecurity.
Join this webinar to learn more on:
Latest trends on Generative AI &...
Lorena Nunes, industrial cybersecurity specialist at Braskem, discusses how to bridge the cultural gap between IT and OT. She emphasizes the importance of building a cybersecurity culture and getting buy-in from leadership and rank-and-file employees.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.