Join for free and connect with our local tech scene

Stay on top of the latest companies and upcoming events with our weekly newsletter, and be counted among the people building the future of your local tech community.

Phoenix, AZ /

Cybersecurity and Basic Hacks

Galvanize 515 E Grant St , Phoenix, AZ 85004 (map)

More than 90% of hacks begin with email. How do we keep letting them in? Come learn in-depth info on phishing, spoofing, and identifying embedded .exe files within PDFs and Word docs.

.

.

AGENDA - Identifying Deception-based Intrusion

.

1730 to 1759 - Pizza

.

1800 to 1815 - Announcements

.

1816 to 1845 - PHISHING & SPOOFING

Andy Jordan brings a a deeper dive into this topic to inform for this issue on the corporate scale. He will share the tools and tactical approaches used and how to detect and mitigate them. More details below.

.

1846 to 1950 - EMBEDDED FILES

David Hernandez is our co-organizer and he returns to share knowledge learned in the trenches for identifying .exe files within PDFs and Word documents.

.

.

MORE ON PHISHING & SPOOFING

.

"It's 2019 and my curiosity is piqued with the attacks other security professionals experienced last year and what their predictions are for this year. I've always liked that each report has a different perspective for the biggest issue facing organizations. Ransomware, IOT, and APTs are major issues and as someone who often reads these "glass ball" reports, the one thing that is common across all of these reports is phishing. Sadly, I don't feel that phishing gets mentioned enough.

.

Most of the major breaches and attacks in the last 5 years (or longer) have an element of Social Engineering. For us to have a deeper understanding of how phishing campaigns are managed, we're going to dive into the tools (Gophish and SET) and approach (purchasing domains, building email messages and creating landing pages to capture credentials) used in phishing campaigns. Once we know how phishing campaigns are created, we'll close with three things you can do TODAY to improve your chances to defend against phishing campaigns."

-- Andy Jordan, CISSP CISM

.

.

.

.

sauce for percentage of hacks: https://www.darkreading.com/endpoint/91--of-cyberattacks-start-with-a-phishing-email/d/d-id/1327704

Comments

Sign in to comment.