Are controlled phishing campaigns against your members the best way to keep your respective firm secure from phishing? This podcast session will look at phishing simulation tools, their overall pros/cons and alternatives available to keep your members secure from getting hooked with that phish.
Questions the moderator asked the speaker:
1. Phishing is thought to have originated in 1995 and love bug struck in 2000. Here we are today in 2023 and phishing is still our number one vector of compromise. We've been able to reduce the risk of malware: why is phishing such a struggle?
2. All security programs preach the importance of user awareness training, and it's been a requirement of clients and regulations for many years now. The majority of user awareness programs utilize phishing simulations. So, I guess the questions is, Are phishing campaigns still a good route forward? Are they being successful at training our users not to fall for that phish?
3. What's the best approach for including phishing awareness into your program? Is it best to continuously cast a line or occasionally try your luck at the phishing hole?
4. I've been hearing more lately about User coaching and how technology can be leveraged to protect users from themselves while presenting coaching opportunities when they do things that they shouldn't. Is this a strategy that's effective in reducing the risk of phishing?
I'm not sure it would be a technology talk if we didn't speak about AI. How do you feel the future of AI impacts the threat of phishing and what steps should we be thinking about now to try and get in front of it?
Moderator:
@David Whale - Director Information Security, Fasken Martineau Dumoulin LLP
Speaker:
@Manuel Sanchez, Information Security & Compliance Specialist, iManage
Recorded on 06/27/2023
#0017: (CCT) When Is It Too Much Data?
#0016: (CCT) Essential Skills Needed to be an eDiscovery Expert - Part 1 - Problem Solving
#0015: (CCT) Clear is Kind Providing Actionable Feedback and Setting Up Your Team for Success
#0014: ILTACON Successful Best Practices for Business Partners
#0013: (CCT) Data Mapping and Why Every Firms Needs to Do It
#0012: (CCT) Sitting in the Hot Seat 2: Trial and Terror
#0011: Joyous Leadership Series, Part 3: Trust and Transparency
#0010: (CCT) How and When to Train Attorneys for Best Long-Term Technology Success
#0009 (CCT) Where’s Better to Build a Career in eDiscovery Within a Law Firm or At An External Consultancy
#0008: Catalyst: Women Leading Change - Co-Chair Interview
#0007: (CCT) Data Debt
#0006: Joyous Leadership Series, Part 2: Listening
#0005: Sit-Down with EVOLVE Co-Chairs Kenneth Jones and Joshua Smith
#0004: (CCT) Mastering Legal Ops: How to Get It Right and What Happens if You Don’t?
#0003: (CCT) Incorporating Large Language Models (LLMs) in the Legal Arena
#0002: (CCT) The Role of AI Powered Chatbots as Digital Research Assistants
#0001: Joyous Leadership Series: Leadership Advice from Joy Heath Rush
Legal Career Labyrinth: Navigating Your Unique Path in Law
”Shields Up” Developing Your Defenses Against Cyber Attacks!
Women Who Lead: Nicki Kastellorizios-Lee and Marion Miller
Create your
podcast in
minutes
It is Free
Insight Story: Tech Trends Unpacked
Zero-Shot
Fast Forward by Tomorrow Unlocked: Tech past, tech future
Black Wolf Feed (Chapo Premium Feed Bootleg)
Bannon`s War Room