Interware is a proud sponsor of - Connected Communities: Building Equitable Integrated Healthcare.
DATE: June 7-8, 2023
VENUE: Sheraton Parkway Toronto North Hotel & Suites, 600 Hwy 7, Richmond Hill, ON L4B 1B2
This conference will be an opportunity to imagine and learn about what an integrated health system built around health equity and community can look like, and the steps needed to get there in the context of Ontario Health Teams.
We cordially invite you to join us in person for Connected Communities: Building Equitable Integrated Healthcare.
Join us, and let’s seize this opportunity together to connect with a diverse array of stakeholders to share learnings on how to build Ontario Health Teams that are equitable and centered around community.
CATCH PAUL LIVE!
Thursday, 08 June 2023 : Morning Concurrent Sessions 10:30-11:30 AM (60mins)
Presentation Title - Ensuring Patient Trust: The Vital Link Between Healthcare Policy and Governance in Protecting Against Cyber Attacks.
Don't miss this opportunity to learn from an expert in the field - see you there!
Schedule to meet with our Solution Consultant
The Hacker’s Playbook: Inside the Mind of a Social Engineer
Modern scams are a multi-billion dollar problem that impacts a variety of industries and organizations of all sizes. From Fortune 50 companies to car dealerships and not-for-profit organizations, nobody is immune and the attackers are smart and very skilled.
One of the most effective attacks is social engineering, especially email phishing and text message smishing. Social engineering is effective in scamming organizations and individuals out of money, stealing sensitive information, spreading malware and ransomware and much more. Many don’t understand that these attacks are so successful because the attackers use our emotions and vulnerabilities against us. Fear, outrage, anger and joy are just some of the lures that attackers use to make their money.
This session will look at the tactics the cyber criminals are using to trick people into performing the kinds of actions that lead to breaches and will examine ways to identify and counteract these attacks. It will also cover recent real-world attacks and the social engineering tricks that made these attacks so effective.
Topics include:
- What attackers are targeting
- Psychology behind the attacks
- Exploitation of human biases and vulnerabilities
- Identifying and developing defensive practices
Don't miss this opportunity to gain valuable insights and learn how to protect yourself and your organization against social engineering attacks. Register now to reserve your spot!
Featured Speakers:
Marcus Ge
Head of GRC - Interware
Erich Kron
Security Awareness Advocate - KnowBe4
The Masked Villain: How Ransomware Infiltrates the Systems and How to Prevent it
Ransomware attacks are growing in frequency and sophistication. These malicious attacks often masquerade as normal activity such as legitimate emails, websites, or software updates, making them difficult to detect and prevent.
We will explore Ransomware's attack methods, as well as an effective prevention technique using a platform-based approach to prevent them from wreaking havoc on your business.
In this webinar, you will learn:
Deeper understanding on the threat and how it infiltrates the systems
How to cover all potential entry points in every attack stage
How integrated security controls can help reduce your risk of infection
How Interware and Fortinet's security solutions protect you against ransomware attacks
Featured Speakers:
Troy Lawrence
Solution Consultant
Interware
Jonathan Qiu
Cyber Security Advisor
Fortinet
Why Mobile Threat Defense Now?
On-Demand Webinar
Mobile security is a critical concern in today's digital landscape, with more and more people using smartphones and tablets to access sensitive information and perform crucial tasks. Protecting these devices from various security threats, such as malware, phishing attacks, and data breaches, is crucial for businesses and individuals alike.
In this session, attendees will learn about:
The attacks and risks impacting their managed and unmanaged (BYO) mobile devices;
Some unexpectedly common mobile phone applications that are malicious;
The current and upcoming regulations around protecting customer data on mobile devices; and
How Interware and Zimperium can help protect you.
Featured Speakers:
Troy Lawrence
Solution Consultant
JT Keating
SVP of Strategic Initiatives
at Zimperium
Special Edition for Senior Leadership: Uprising Cyber Threat of 2023 and How to Best Defend your Organization
On-Demand Webinar
Hear from Interware security expert Paul Zhao, CISSP CISM President and Chief Technology Officer share his thoughts on the uprising cyber threats of 2023 that senior leaders need to be aware of and most importantly, how to defend your organization.
This webinar is a special edition for top management to critically consider and look ahead the most alarming threats that could harm your business.
Featured Speaker:
Paul Zhao, CISSP CISM
President and Chief Technology Officer
Why Data Backup is the Most Significant Topic in Today's Threat Landscape?
Cloud apps like Office 365 help your teams work and collaborate efficiently. But as more and more information moves to the cloud, there are risks involved that you may not be aware of. According to 2022 statistics, the cost of downtime for data loss is at least $1,410 per minute.
This month, we will discuss why data backup is the most significant topic in today's threat landscape with Datto, a leading global provider of cloud-based software solutions for backup and disaster recovery.
In this live webinar, you will learn:
Importance of protecting your Microsoft 365 and Google Workspace
Datto SaaS protection solution: What it does and how it works
Importance of protecting valuable data from ransomware, accidental or malicious deletion, damaged or stolen workstations
What is an image-based backup and how does it work
Microsoft does not protect you from data loss due to deprovisioned user accounts.
Recover from a ransomware attack in Microsoft 365
The steps in this article will give you the best chance to recover data and stop the internal spread of infection.
Microsoft Services Agreement
These terms (the "Terms") govern the use of those Microsoft products, websites, and services listed.
Get your copy of the latest InfoSec Maturity Roadmap 2023 Edition and see where your company stands and what your next steps should be!
Access up to $15,000 in government funding to boost your business' IT through Canada Digital Adoption Program (CDAP)
Learn how to get access of up to $15,000 of digital adoption advisory services from the Federal Government to boost your business' IT. As an approved Digital Advisor, Interware will help you acquire the limited-time grant, which you can take advantage of to reduce the risk of attack and improve overall security.
This grant is on a first come, first-serve basis, which means you have to act NOW as the $4 billion dollar pool of funds is running low.
How does the program work? Hear directly from Interware as an approved digital advisor!
Note, to be eligible for the grant, you must:
Be an incorporated business (either at the national or provincial level) OR a Canadian resident sole proprietor
Be a privately-owned, for-profit entity
Have a maximum of 499 full-time equivalent employees
Have earned between $500,000 and $100,000,000 in revenue in at least one of the past 3 years
Learn how the Government of Canada can subsidize your next cybersecurity project with Interware
Let Interware help you subsidize your next cybersecurity project for a value up to $15,000! As an approved Digital Advisor for the Government of Canada, Interware has access to a limited-time grant, which we want you to take advantage of to help reduce the risk of attack and improve overall security.
How does the Boost Your Business Grant work? Hear directly from Interware as an approved digital advisor to learn more!
Note, to be eligible for the grant, you must:
Be an incorporated business (either at the national or provincial level) OR a Canadian resident sole proprietor
Be a privately-owned, for-profit entity
Have a maximum of 499 full-time equivalent employees
Have earned between $500,000 and $100,000,000 in revenue in at least one of the past 3 years
Password Management in the Evolving Workplace
This webinar is meant for end-users to help them better understand the importance of having a strong password and using a password manager to increase productivity, security, and convenience in the workplace.
#BeCyberSmart with Interware's Email Security and Phishing Training
This session is meant for end-users to help them better understand email security, as well as ways they can avoid and protect themselves from phishing attacks.
The #1 biggest security threat to any organization is their employees. Without proper training, it's not a matter of if, but WHEN.
In this webinar, we will discuss:
- What is phishing?
- Threat landscape
- Case Study: Uber
- Real life phishing examples
- Different tricky ways you could be phished
- Industry best practices when receiving a phishing email
What Every CIO Must Know: Privacy - Expectations, Terms, and Tools
This webinar will cover important information all business executives should know about privacy data and how it should be stored, protected, and regulated by laws.
Our guest speaker, Sanjay, is a professional industry expert with 25 years of experience. He will discuss tips a CIO must know that are sure to help your organization meet data privacy and security expectations.
After this event, you will learn about:
- Privacy laws such as GDPR, CCPA, PIPEDA, etc.
- How data should be captured, stored, and what the required outputs are.
- How the CIO should best coordinate with a Data Privacy Officer or Chief Risk Officer.
In-Person Training: Creating a Comprehensive Security Fabric
Let's get technical!
Participants who attended this workshop learned how:
Introduce the Fortinet Security Fabric and discuss the main business drivers
Detail specific components that make up the Fortinet Security Fabric
Build a comprehensive solution to prevent, detect and respond to security incidents using the broad, integrated, and automated approach
12 Ways Multi-Factor Authentication can be Hacked and How to Defend Against It
Multi-factor Authentication (MFA) is NOT an option, but a MUST. Risk reduction and layered defense are critical for protecting your organization against the alarming number of cyber attacks. But did you know MFA can also be hacked?
This webinar discusses the many ways multi-factor authentication can be hacked and how to best defend against it. It includes a hacking demo by Kevin Mitnick and successful examples of every attack type.
Join us and be a better computer security defender as we talk about:
- Types of MFA hacks
- Different demo attacks for unsecure MFA
- Tips on choosing the best MFA and how to defend it
Get inside the mind of the hacker, learn their techniques, and use the best way to defend your organization's MFA before it's too late.
REGISTER BELOW TO DOWNLOAD ROGER GRIME’S PRESENTATION.
Learn how to Forensically Examine Phishing Emails
Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network.
Staying a step ahead may even involve becoming your own cyber crime investigator, forensically examining actual phishing emails to determine the who, the where, and the how.
In this live webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, shows you how to become a digital private investigator! You’ll learn:
How to forensically examine phishing emails and identify other types of social engineering
What forensic tools and techniques you can use right now
How to investigate rogue smishing, vishing, and social media phishes
How to enable your users to spot suspicious emails sent to your organization
Get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late!
A Comprehensive Guide to a Strong and Reliable Zero-Trust Strategy
Traditional security models operate under the assumption that everything inside the organization's network should be trusted. However, automatically extending trust to any device or user intentionally or unintentionally puts the organization at risk and becomes compromised. That is why many security leaders are turning to a zero-trust approach to identify, authenticate, and monitor users and devices, both on and off the network.
A zero-trust strategy shifts the fundamental paradigm of open networks built around inherent trust to one that delivers on the zero-trust principles by:
- Knowing who is on the network
- Knowing what is on the network
- Providing on-net and off-net protection
- Enforce application access management
4 Essential Steps to Becoming Cyber-Resilient With Fortinet
Ransomware is Here to Stay.
In order to fight the rapidly growing Ransomware - businesses need a comprehensive solution that is simple, straightforward, and affordable. During this session, we will discuss essential Fortinet solutions that will:
- Prevent Phishing and Other Email-initiated Attacks
- Stop Malicious Files and Communications on the Network
- Protect against ransomware at the Endpoint
- Prevent Advanced Threats and Automate Threat-intelligence Sharing
Breakthrough Solutions in Endpoint Security: The Future of the Hybrid Workforce
Endpoint security is the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, mobile devices, and even printers from being exploited by malicious acts. With our Advanced Endpoint Security protections, you can now choose and be safely connected with any devices from anywhere, anytime!
We will provide you a better understanding of:
- Importance of Endpoint Security
- Choosing the best Endpoint Protection Platform
3 Simple Ways to Prevent Ransomware
The concern of ransomware attacks is not about “IF” but “WHEN”.
A truly effective strategy to safeguard your data is to apply a layered defense approach. Learn how Interware and Veeam can help your company combat Ransomware and build a comprehensive defense strategy toward protecting sensitive information.