One Phish, Two Phish, Red Phish, Blue Phish: How to Detect and Mitigate Social Engineering and Ransomware Techniques

Ransomware attacks like WannaCry and NotPetya are increasing in both frequency and damage, routinely making headline news with their abilities to bring down networks of established companies. Yet these cyberattacks typically start by compromising the weakest point in your security chain – people – through simple or complex phishing techniques before spreading to other parts of your network. How can you prepare yourself and your firm to stay ahead of the latest social engineering tactics? Are there some simple, effective ways to reduce your firm’s risk exposure?

Join Andrew Hartnett (Officer, Securities & Financial Services Practice, Greensfelder, who helped formulate cybersecurity policy for NASAA) and E.J. Yerzak, who heads Ascendant’s cybersecurity division, for an engaging discussion of the phases of a social engineering attack, what to look out for, and effective ways to reduce your firm’s risk exposure.

  • Warning Signs: The Red Flags You’re Being Phished
  • Current Social Engineering Tactics and Techniques – Why Are They So Effective?
  • Oversharing: How the Data You Post Online is Mined to Target You
  • Staying One Step Ahead of the Social Engineers
  • Techniques for Testing and Training Your Staff

Fill in the form below to download this ComplianceCast

Loading form...

Subscribe to CSS Blog

CSS frequently publishes blog posts which are written by our team from their observations in the field, at conferences and through experiences with compliance professionals. These posts are designed to further knowledge and share industry best practices. Topics run the gamut, including Form ADV, cybersecurity, MiFID II, position limit monitoring, technology challenges and more. Complete and submit the brief form below to receive notifications when we publish new content.

Loading form...

Latest Content