About this webinar:
Don't click phishy links. Everyone knows that. But are your end users prepared to quickly identify today's tricky tactics being used by the bad guys? Probably not. Cybercriminals have moved beyond simple bait and switch domains. They're now employing a variety of advanced social engineering techniques to entice your users into clicking and putting your network at risk. You need to stay a step ahead of the bad guys.
Join us when Javvad Malik, Security Awareness Advocate at KnowBe4, shows you how to become a rogue URL expert. He’ll dive deep into the latest techniques and defenses to share:
· Real-life examples of advanced attacks using rogue digital certificates, homograph attacks, and more
· Safe forensic methods for examining URLs and other tactics for investigating phishy emails
· Strategies for dissecting URLs on mobile without clicking
· Simple ways you can train your users to scrutinise URLs and keep your network safe
Find out what you need to know to keep your network protected.
Special Projects Editor, ComputingView presenter info
Tom Allen is the Special Projects Editor for Computing, V3 and The Inquirer. He joined Incisive Media in 2017 from the display industry; trading LCDs and quantum dots for big data and the IoT. As well as writing, Tom regularly interviews C-level IT leaders, helps to organise events across the three titles and complains about improper use of the Oxford comma.
Security Awareness Advocate, KnowBe4View presenter info
Javvad Malik is a Security Awareness Advocate at KnowBe4, a blogger event speaker and industry commentator who is possibly best known as one of the industry’s most prolific video bloggers with his signature fresh and light-hearted perspective on security that speak to both technical and non-technical audiences alike. Prior to joining KnowBe4, Javvad was security advocate at AlienVault. Before then, he was a Senior Analyst at 451’s Enterprise Security Practice (ESP), providing in-depth, timely perspective on the state of enterprise security and emerging trends in addition to competitive research, new product and go-to-market positioning, investment due diligence and M&A strategy to technology vendors, private equity firms, venture capitalists and end users.