Sponsor Track

Crowd Sourced Security – Applying the Wisdom of the Crowd to Cyber Defences


Schedule Not Yet Finalized October 2, 2018 - Feedback     

Bookmark and Share

John “Lex” Robinson

Taking advantage of user provided intelligence improves your organization’s ability to recognize, report and respond to active phishing threats and keeps you ‘Left of Breach’ on the cyber kill chain. Through development of anti-phishing program best practices, the use of active threat intelligence and trend analysis, this presentation will show you how to improve your company’s security capabilities by augmenting your technical defences with your most powerful resource – your end users.

Attendees will walk away with the insight, knowledge and tools required to effectively design and implement an Anti-Phishing Program that takes advantage of their human resources in support of organizational cyber-security and effectively reduce the risk of breach.