Phriendly Phishing
Phriendly Phishing
  • 22
  • 128 227
Vulnerability Management Q&A - Security Expert, Mark Hofman, Answers Frequently Asked Questions
How should start-ups balance Vulnerability Management practices with the day-to-day requirements of growing a business?
How do you prioritise all the assets that need scanning within the network?
How do you know the scanning you’re doing is accurately identifying all the necessary vulnerabilities that need fixing?
Should you ban scanning from certain business-critical parts of the network to avoid the risk of disruption?
Get answers to all these questions and much more!
Vulnerability Management is the foundation of an effective cybersecurity program. It involves reducing attack surfaces and minimising the risk of devastating cyber breaches.
To be effective, your organisation’s approach needs to be robust and holistic.
Whether you’re developing a new Vulnerability Management strategy, or have been developing your plans over several years, you need to know you’re on the right path.
This webinar helps you get external validation of all your Vulnerability Management efforts.
มุมมอง: 9 060

วีดีโอ

Interview with Dion Devow - Aboriginal and Torres Strait Islander Community Leader
มุมมอง 3934 ปีที่แล้ว
In this interview Shearwater's David Halfpenny talks to Aboriginal and Torres Strait Islander community leader Dion Devow about indigenous communities and their relationship with IT and cyber security. They also discuss how to foster more indigenous representation in the IT industry.
Practical and Proven Ways to Improve Staff Cybersecurity Awareness
มุมมอง 2554 ปีที่แล้ว
People are often accused of being the weakest link in the cybersecurity chain, and with good reason, but they don’t have to be. Shearwater’s David Halfpenny talks with behavioural modeling expert Marvin Oka from Behavioural Modelling Research about the reasons why people do insecure things and looks at practical suggestions around how you can improve your cybersecurity posture through your people.
Shearwater Purpose and Values
มุมมอง 775 ปีที่แล้ว
We believe in complete openness and transparency, which sets us apart and builds the strong relationships we need to ensure a safer connected world. Our values are embedded in all that we do: Act with heart and soul Create magical customer experiences Take pride, own the outcome Speak freely and respectfully Have fun, as a team If you want to be a valued member of our team, please check out our...
3 Proven Pillars to Build a Security Awareness Culture
มุมมอง 3715 ปีที่แล้ว
Security Awareness Training Tips Human error leads to the bulk of damaging breaches we see over and over again. This video will offer insights that will help you succeed in improving staff cybersecurity awareness and driving meaningful change. What to expect from this video: Most IT and security leaders recognise that staff security awareness should be a vital part of their security program. Bu...
Phriendly Phishing Security Awareness Training and Simulation
มุมมอง 4495 ปีที่แล้ว
Damian Grace, Phriendly Phishing Founder and General Manager, discusses the negative impact of phishing and explains how effective security awareness helps prevent costly security incidents.
Shearwater Information Security Services
มุมมอง 1975 ปีที่แล้ว
Company video highlighting our purpose and outlining the services we offer to organisations in Australia and the rest of the world.
How to Get Started with Cybersecurity Incident Response
มุมมอง 12K5 ปีที่แล้ว
Shearwater’s Chief Technology Officer, Mark Hofman, shares his steps for building an Incident Response Plan to help you take control of a security incident. Framed around the common and costly Business Email Compromise (BEC) attacks, Mark offers actionable tips on setting up an incident response process and validating your incident response plans. You will learn about: What defines an incident ...
Securing your Cloud Data : Practical Advice to Mitigate Risk
มุมมอง 1876 ปีที่แล้ว
Cloud computing undoubtedly delivers flexibility, efficiency and cost reduction - but as it continues to rapidly transform the way we use, store and access data, it also continues to introduce a host of new threats and security challenges. Outsourcing data does not mean outsourcing responsibility. As a business leader, you are now faced with the challenge of managing shared responsibility with ...
The Insider’s Guide to Building a Successful Security Awareness Program
มุมมอง 1.4K6 ปีที่แล้ว
Includes an anatomy of a real-world BEC attack Shearwater’s Phishing and Security Awareness General Manager, Damian Grace, shares his steps for developing a security awareness program that achieves results. Backed by data from thousands of users, Damian will offer actionable tips and share lessons learned from organisations across different sizes and sectors. You will learn about: - Common secu...
Guide to Developing a Cybersecurity Strategy & Roadmap
มุมมอง 35K6 ปีที่แล้ว
Download our "Guide to Developing a Cyber Security Roadmap" by visiting our website: www.shearwater.com.au/cybersecurity-roadmap-ebook/ Developing an effective security roadmap is a challenging process as it involves a number of moving parts that need to work together so you can make sure: - Your organisation is compliant - You have effective policies in place - You can detect vulnerabilities a...
Ransomware Reality Check - Separating Hype from Hurt
มุมมอง 1576 ปีที่แล้ว
Do you feel overwhelmed with all the ransomware hype that’s out there? In a world full of catchy headlines and addictive social media feeds, security leaders are bombarded with more ransomware tips and tricks than they can possibly handle. They are left plagued by lingering questions. Where do I start? How do I know which tactic is right for my organisation? How do I get concrete results? And m...
Vulnerability Management 101 - Best Practices for Success [Complete Webinar]
มุมมอง 62K7 ปีที่แล้ว
Download our Vulnerability Management eBook here: www.shearwater.com.au/vulnerability-management-ebook/ Most security leaders recognise that scanning for vulnerabilities should be a vital part of their security program. But running a vulnerability scan is just the tip of the iceberg. Ever wondered what you should be scanning in your environment, or how often you should be scheduling scans? And ...
5 Vital Tips for Vulnerability Managemet Success
มุมมอง 937 ปีที่แล้ว
Get 5 quick tips on what's needed to establish vulnerability management program that works. In this summary we will cover how to: Establish a vulnerability management strategy Follow vulnerability management best practices Get the right tools, resources, and processes in place Feed vulnerability data into other tools for deeper intelligence Report and get the right information to the right peop...
How to make the most out of your vulnerability scanning tools
มุมมอง 1287 ปีที่แล้ว
Vulnerability scanning tools can be valuable for a number of processes in an organisation. Such as post build validation, patch validation, application management, security certification discovery and validation, and asset management. Follow us on LinkedIn: au.linkedin.com/company/shear... Learn More About Our Vulnerability Management Services: www.shearwater.com.au/vulnerability-management-as-...
When should you schedule your vulnerability scans
มุมมอง 717 ปีที่แล้ว
When should you schedule your vulnerability scans
What should you scan in your network
มุมมอง 737 ปีที่แล้ว
What should you scan in your network
What tools do you (really) need for vulnerability management
มุมมอง 2K7 ปีที่แล้ว
What tools do you (really) need for vulnerability management
Skills that a vulnerability management team has to have
มุมมอง 1347 ปีที่แล้ว
Skills that a vulnerability management team has to have
How to setup the right processes for vulnerability management
มุมมอง 3.2K7 ปีที่แล้ว
How to setup the right processes for vulnerability management
Why you need vulnerability management
มุมมอง 1697 ปีที่แล้ว
Why you need vulnerability management
Educating Employees to Prevent Phishing Attacks
มุมมอง 8727 ปีที่แล้ว
Educating Employees to Prevent Phishing Attacks