Trellix

Trellix

Analyzing phishing attacks that start from emails! How to implement countermeasures by understanding sophisticated attack methods

Features of the seminar

Seminar explaining the security measures needed now, learning from phishing attacks that cannot be prevented with traditional email security

In recent years, the number of reports of phishing attacks has been increasing.
One of the reasons for the increase in damage is that the number of cloud service users is increasing, and the opportunities to enter authentication information are increasing.
Attackers aim to steal credentials, and their attack methods change over the years. We have also confirmed attacks using sophisticated techniques that cannot be detected by conventional email security products.
In order to avoid becoming a victim, it is necessary to understand the latest phishing attacks and take countermeasures.
In this seminar, we will take up examples of phishing attacks that begin with emails and explain points to strengthen security against phishing attacks.
Please take this opportunity to participate.

Schedule/Application

schedule

time

venue

Application

Scheduling

How to participate in the online seminar

  • Please register the necessary information from "Apply here" at the top of this page.
  • We will email you the login URL for the online seminar by 17:00 the day before the event. *
  • On the day of the event, when it is time, please access from the login URL and listen to the lecture.

*Due to security policies, it may not be delivered. If you have not received it, please contact trellix_sales@macnica.co.jp.

*Registration is required to attend. Please refrain from sharing your login URL.

Event requirements

Venue

Held as an online seminar

*You can perform a connection test in advance from the following URL.

https://zoom.us/test
Capacity none
Preparation
What to prepare on the day
  • PC to attend the online seminar
  • Environment for Internet connection
subject
  • Representative of the Corporate Information Systems Department
  • For those considering email security measures
Cost Free (pre-registration required)

Program

10:00~10:10
Current state of phishing attacks
10:10~10:20
Attack method ① Credential phishing attack
10:20~10:30
Attack method ②Quishing attack
10:30~10:35
Overview of Trellix Email Security
10:35~10:40
Summary, POC campaign
10:40~10:45
Q&A

*The program is subject to change without notice. Please note. Please check this web page for the latest information.

Inquiry/Document request

In charge of Macnica Trellix Co., Ltd.

  • TEL:045-476-2010

Mon-Fri 8:45-17:30