FREE WEBINAR

How to protect your C-suite from whale phishing attacks

  • September 30 at  2 PM AEST | 11 AM BST | 11 AM EDT
  • 45 Mins

Presented by

Jay,Product expert

About this webinar

Compared to regular phishing attacks, whale phishing attacks are highly targeted, and therefore often successful. A recent experiment found that top executives are highly vulnerable to whaling campaigns, and are more likely to fall victim compared to other employees. 

As top executives are the targets, successful whaling campaigns can result in wire transfers of enormous sums, loss of valuable intellectual property or sensitive business information, and more. 

In this webinar, we discuss how whaling attacks are carried out and how to protect your C-suite from such attacks.

In this webinar, we'll cover:

  • What whale phishing is, and how it's accomplished.
  • A recent whale phishing case study.
  • How to protect your C-suite from whale phishing.
  • 2Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 3Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.
  • 4Different components of a network and the need to audit them.
  • Tracking logons and critical changes made to network device configurations.
  • Monitoring network devices to get clear insights into network activity.
  • Common techniques of network attacks and how security and attack reporting.
  • Detecting and mitigating threats at an early stage with alerts.
  • How EventLog Analyzer can help secure your network.

Register for the webinar

User already registered
  • Please enter your name Please enter your email Please enter valid email address
    • September 30 at 2 PM AEST
    • September 30 at 11 AM BST
    • September 30 at 11 AM EDT
  • Select time zone
     
  • By clicking 'Claim Your Spot Now', you agree to processing of personal data according to the Privacy Policy.

© 2022 Zoho Corporation Pvt. Ltd. All rights reserved.

Claim Your Spot Now