At some point, we’ve all been the target of a phishing scam—the suspicious emails that appear to be from a known sender but in actuality come from a scammer requesting that you click a link, open an attachment, or provide personal information. If fallen for, these emails give the scammer unwanted access to private information. While some of these scams are easily identified, the art of phishing continues to evolve.
With the multitude of devices becoming more and more prevalent, the risk of falling victim to a phishing scam is increasing. Education is one of the top solutions to protecting your people and organization from phishing. Join us to learn what steps you should take to remain protected.
- Define the different types of phishing attacks and how they work.
- Identify tactics to protect against phishing attacks in an organization.
- Analyze the potential impact of a successful phishing attack on an organization’s data security systems and operations.
- Summarize best practices for creating secure passwords, authentication methods, and other security protocols to prevent phishing attacks from occurring in the first place.
- Discuss strategies for mitigating risks associated with responding to a phishing attack if one is detected within an organization’s network or system environment.
Kyle Hendrickson, CISSP, Director/Cybersecurity Practice Leader | Eide Bailly
Kyle Hendrickson has been in Information Technology leadership roles for the past two decades, spending the last 15 years leading Cybersecurity Teams and providing strategic guidance for C-Suites. During this time, he built multiple IT and Cybersecurity groups from the ground up – creating the vision and enabling the resources to keep important data and systems safe and secure. Most recently Kyle was responsible for building the cyber defense capability at a regional financial institution focused on improving visibility to all systems while reducing the attack surface of the organization.
CPE Credit: 1
Field of Study: Information Technology
Level of Knowledge: Basic
Delivery Method: Group-Internet Based
Additional Information: This is a Group-Internet Based Webinar. No prerequisites or advanced preparation required. For information regarding a complaint and/or program cancellation policies, please contact Mye Collins.