Available On Demand
You and your customers rely heavily on security solutions to provide a layered defense against cyberattacks. But there’s a weak spot in your security strategy that cybercriminals are only too happy to exploit: your customers’ end users. The success rates of targeted phishing and social engineering tactics mean end users are the easiest path for cybercriminals to infiltrate defenses.
So, why are users such an easy target, and what can you do to change that?
In this interactive webcast, join regular Channel Futures contributor, Nick Cavalancia, and Dan Fox from Webroot as they discuss:
- The state of threats vs. security, and who’s winning the battle
- User insecurity: why a lack of a “security culture” is to blame
- Turning your weakest link into your strongest defense with security awareness training
If you have already registered, click here to access
Nick Cavalancia, Channel Futures Contributor
Nick Cavalancia has nearly 20 years of enterprise IT experience, is an accomplished consultant, speaker, trainer, writer, and columnist and has achieved industry certifications including MCSE, MCT, Master CNE and Master CNI. He has authored, co-authored and contributed to over a dozen books on Microsoft technologies. Nick regularly speaks, writes and blogs for some of the most recognized tech companies today on a variety of topics. Follow Nick on Twitter @nickcavalancia or @Techvangelism.
Dan Fox, Senior Product Manager
Dan Fox is co-founder and CEO of Securecast, a Security-Awareness-as-a-Service platform acquired by Webroot in 2017. Dan’s career in technology includes more than 15 years of cross-functional experience, beginning in the San Francisco Bay Area during the dot-com bubble era, when he performed technical support and systems administration roles. Eventually, this experience led Dan to director-level roles in information security, technology, and product management for several industry-leading technology firms. Dan believes that a secure organization must be built upon a strong culture of security that starts with a secure and aware end-user, and extends into the firm’s technical, administrative, and managerial controls.