Event details

Date

Time

Duration

Wednesday 7th July

11am

60 mins

Sponsored by:

Sponsor Logo

About this webinar:

Email is still a top attack vector criminals use. A majority of cyberattacks start with a phishing email, but email attacks are about much more than phishing and malware. Join Computing's Tom Allen in conversation with KnowBe4's Javaad Malik, as we talk about the top ways hackers can fool your users.

This web seminar will cover a variety of prominent email attacks like silent malware, remote password hash capture and rogue rules - and why social engineering sits at the top of all of them. We'll look at real-life examples of every type of attack, and talk about the best ways to defend against them. This is an event you can't afford to miss.

Panel

generic

Tom Allen

Special Projects Editor, Computing

View bio

Tom Allen is the Special Projects Editor for Computing, V3 and The Inquirer. He joined Incisive Media in 2017 from the display industry; trading LCDs and quantum dots for big data and the IoT. As well as writing, Tom regularly interviews C-level IT leaders, helps to organise events across the three titles and complains about improper use of the Oxford comma.


Javvad Malik

Security Awareness Advocate, KnowBe4

View bio

Javvad Malik is a Security Awareness Advocate at KnowBe4, a blogger event speaker and industry commentator who is possibly best known as one of the industry’s most prolific video bloggers with his signature fresh and light-hearted perspective on security that speak to both technical and non-technical audiences alike. Prior to joining KnowBe4, Javvad was security advocate at AlienVault. Before then, he was a Senior Analyst at 451’s Enterprise Security Practice (ESP), providing in-depth, timely perspective on the state of enterprise security and emerging trends in addition to competitive research, new product and go-to-market positioning, investment due diligence and M&A strategy to technology vendors, private equity firms, venture capitalists and end users.

Register

Do you also want to register for the following events?

Our registration process uses cookies, by submitting this registration form you agree to our cookie policy.