This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

action image header it logic
Forums it-sa Expo Knowledge Forum E

5 real cyberattacks and how to protect your company

We'll show you 5 of the most insidious email attacks currently in existence, how they work and how they were stopped.

calendar_today Tue, 22.10.2024, 15:30 - 15:45

event_available On site

place Forum, Booth 9-103

Action Video

south_east

Action description

south_east

Speaker

south_east

Themes

Awareness / Phishing / Fraud

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Cybercriminals are clever and highly motivated. Why shouldn't they? They operate in a growth industry where the risks are low and the rewards are so high that cybercrime is expected to cost the world $23.8 trillion per year by 2027.

With so much money to be made, the creativity behind today's cyberattacks is seemingly endless. New and sophisticated malware, phishing and social engineering methods emerge every day that defenders can only stop by playing a game of "whack-a-mole." But while these new threats may seem infinitely diverse, they all have a few basic things in common: they use email and target people.

In this talk, we'll show you some of the most insidious email attacks currently in existence and how they work. Then we'll show you how they were stopped.
... read more

Downloads

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.