Automatically stop data breaches and security threats caused by employees on email. Powered by machine learning, Tessian detects anomalies in real-time, integrating seamlessly with your email environment within minutes and starting protection in a day. Provides you with unparalleled visibility into human security risks to remediate threats and ensure compliance.
A complimentary event dedicated to helping forward thinking security teams navigate the ever-changing threatscape. Hear from the top CISOs and industry experts who have paved the way when it comes to stopping email threats and building stronger security cultures.
As an approved (ISC)2 CPE Submitter Partner, Tessian is offering CPE credits for attending this event.
Powered by:
|
Jump-start your afternoon with coffee and networking. This is a great time to get to know your fellow fwd: thinkers and to share with us what you’d like to get out of the sessions.
Our roadshow emcee, Tessian’s Customer Success Director, Robyn Savage, will kick off with a look into the agenda and some general “housekeeping” at the event.
Email security had remained unchanged for years: fit for purpose and ‘good enough’. Secure Email Gateways and other legacy technologies are good at stopping spam, broad phishing attacks, and using rules to prevent sensitive data sharing. That was then, this is now. Threat actors today send highly targeted attacks at scale. These targeted attacks involved social engineering of people; impersonating vendors and CxOs, and aim to trick employees. SEGs and email platforms can not keep. Business email compromise is now the biggest risk to any organization, costing on average $4.9 million. What’s more, risks continue to amplify with human error accounting for 82% of breaches in 2022. So the question is: “are your legacy email security controls fit for purpose in today’s world?”
Speaker: Ed Bishop, CTO & Co-Founder at Tessian
When tasked with the impossible, security leaders plan for the unplanned, predict the unknown, and presume the inevitable. But yet, somehow, they can defend and protect their organizations against sometimes the most dangerous attacks. This incredible panel of Fwd: Thinkers will dive deep into how they have built their resilient security defenses while offering insight into their cyber predictions for the year ahead. There is a lot to unpack. Buckle up; you are in for a ride!
Speakers: Nate Tombs, CISO at Man Group; Ash Hunt, Global CISO at Apex Group; Ian McShane, VP Strategy at Arctic Wolf; James Alliband, Director, Product Marketing
The Internet of Things, Industrial Internet of Things (whatever that is!), Operational Technology and related security flaws that affect the safety of ships We’ll look at the conflicting drivers for connectivity of ‘stuff’ and the vulnerabilities this creates. We’ll show some live demonstration of security issues in these embedded systems and how they can be used to affect shipping and other industries.
Speaker: Ken Munro – Ethical Hacker
All of our speakers will reconvene for a live Q&A. This is the time to ask your burning questions from the day.
After the sessions finish you’re invited to enjoy a private guided tour of this iconic warship. Visit the sick bay, the gun emplacements, as well as the bridge, and learn more about the ship’s long service history and remarkable crew.
All this talk and history has no doubt worked up a thirst, so you’re also invited for refreshments on the ship’s quarterdeck at the rear of the ship. This space has one of the best views of the London skyline at sunset, and is the perfect spot to network and enjoy some refreshments and entertainment.
Don't Take It From Us