Interware is a proud sponsor of - Alliance for Healthier Communities 2024 Conference
Jun
5
to Jun 6

Interware is a proud sponsor of - Alliance for Healthier Communities 2024 Conference

 
 
 

DATE: June 5-6, 2024

VENUE: Sheraton Parkway Toronto North Hotel & Suites, 600 Hwy 7, Richmond Hill, ON L4B 1B2

The purpose of this conference are to examine the impacts of the evolving socio-economic environment, artificial intelligence (AI), and climate change on communities and equity-deserving groups, many of whom have been experiencing health disparities due to inequitable access to resources and services. How can we together build a strong and sustainable environment with solutions in placed.

Our goal is to create a space of learning, connection and inspiration to action.

 

Schedule to meet with our Solution Consultants

View Event →
Interware is a proud sponsor of - Connected Communities: Building Equitable Integrated Healthcare.
Jun
7
to Jun 8

Interware is a proud sponsor of - Connected Communities: Building Equitable Integrated Healthcare.

 
 
 

DATE: June 7-8, 2023

VENUE: Sheraton Parkway Toronto North Hotel & Suites, 600 Hwy 7, Richmond Hill, ON L4B 1B2

This conference will be an opportunity to imagine and learn about what an integrated health system built around health equity and community can look like, and the steps needed to get there in the context of Ontario Health Teams.

We cordially invite you to join us in person for Connected Communities: Building Equitable Integrated Healthcare.

Join us, and let’s seize this opportunity together to connect with a diverse array of stakeholders to share learnings on how to build Ontario Health Teams that are equitable and centered around community. 

 
 
 

CATCH PAUL LIVE!

Thursday, 08 June 2023 : Morning Concurrent Sessions 10:30-11:30 AM (60mins)

Presentation Title - Ensuring Patient Trust: The Vital Link Between Healthcare Policy and Governance in Protecting Against Cyber Attacks.

Don't miss this opportunity to learn from an expert in the field - see you there!


Schedule to meet with our Solution Consultant

View Event →
The Hacker’s Playbook: Inside the Mind of  a Social Engineer
May
30
1:30 PM13:30

The Hacker’s Playbook: Inside the Mind of a Social Engineer

 

Modern scams are a multi-billion dollar problem that impacts a variety of industries and organizations of all sizes. From Fortune 50 companies to car dealerships and not-for-profit organizations, nobody is immune and the attackers are smart and very skilled.

One of the most effective attacks is social engineering, especially email phishing and text message smishing. Social engineering is effective in scamming organizations and individuals out of money, stealing sensitive information, spreading malware and ransomware and much more. Many don’t understand that these attacks are so successful because the attackers use our emotions and vulnerabilities against us. Fear, outrage, anger and joy are just some of the lures that attackers use to make their money.

This session will look at the tactics the cyber criminals are using to trick people into performing the kinds of actions that lead to breaches and will examine ways to identify and counteract these attacks. It will also cover recent real-world attacks and the social engineering tricks that made these attacks so effective.

Topics include:

- What attackers are targeting 

- Psychology behind the attacks

- Exploitation of human biases and vulnerabilities

- Identifying and developing defensive practices

Don't miss this opportunity to gain valuable insights and learn how to protect yourself and your organization against social engineering attacks. Register now to reserve your spot!

 

Featured Speakers:

 

Marcus Ge

Head of GRC - Interware

Erich Kron

Security Awareness Advocate - KnowBe4

 
View Event →
The Masked Villain: How Ransomware Infiltrates the Systems and How to Prevent it
Apr
19
2:00 PM14:00

The Masked Villain: How Ransomware Infiltrates the Systems and How to Prevent it

Ransomware attacks are growing in frequency and sophistication. These malicious attacks often masquerade as normal activity such as legitimate emails, websites, or software updates, making them difficult to detect and prevent.

We will explore Ransomware's attack methods, as well as an effective prevention technique using a platform-based approach to prevent them from wreaking havoc on your business. 

In this webinar, you will learn:

  • Deeper understanding on the threat and how it infiltrates the systems

  • How to cover all potential entry points in every attack stage

  • How integrated security controls can help reduce your risk of infection

  • How Interware and Fortinet's security solutions protect you against ransomware attacks

Featured Speakers:

Troy Lawrence

Solution Consultant

Interware

 

Jonathan Qiu

Cyber Security Advisor

Fortinet

 
View Event →
Why Mobile Threat Defense Now?
Mar
15
2:00 PM14:00

Why Mobile Threat Defense Now?

On-Demand Webinar

Mobile security is a critical concern in today's digital landscape, with more and more people using smartphones and tablets to access sensitive information and perform crucial tasks. Protecting these devices from various security threats, such as malware, phishing attacks, and data breaches, is crucial for businesses and individuals alike.

In this session, attendees will learn about:

  1. The attacks and risks impacting their managed and unmanaged (BYO) mobile devices;

  2. Some unexpectedly common mobile phone applications that are malicious;

  3. The current and upcoming regulations around protecting customer data on mobile devices; and

  4. How Interware and Zimperium can help protect you.

Featured Speakers:

 

Troy Lawrence

Solution Consultant

 
 

JT Keating

SVP of Strategic Initiatives

at Zimperium

 
View Event →
Special Edition for Senior Leadership: Uprising Cyber Threat of 2023 and How to Best Defend your Organization
Feb
28
2:00 PM14:00

Special Edition for Senior Leadership: Uprising Cyber Threat of 2023 and How to Best Defend your Organization

On-Demand Webinar

Hear from Interware security expert Paul Zhao, CISSP CISM President and Chief Technology Officer share his thoughts on the uprising cyber threats of 2023 that senior leaders need to be aware of and most importantly, how to defend your organization. 

This webinar is a special edition for top management to critically consider and look ahead the most alarming threats that could harm your business.

 

Featured Speaker:

 
 

Paul Zhao, CISSP CISM

President and Chief Technology Officer

View Event →
Why Data Backup is the Most Significant Topic in Today's Threat Landscape?
Jan
26
1:00 PM13:00

Why Data Backup is the Most Significant Topic in Today's Threat Landscape?

 
 
 

Cloud apps like Office 365 help your teams work and collaborate efficiently. But as more and more information moves to the cloud, there are risks involved that you may not be aware of. According to 2022 statistics, the cost of downtime for data loss is at least $1,410 per minute.


This month, we will discuss why data backup is the most significant topic in today's threat landscape with Datto, a leading global provider of cloud-based software solutions for backup and disaster recovery.

In this live webinar, you will learn:

  • Importance of protecting your Microsoft 365 and Google Workspace

  • Datto SaaS protection solution: What it does and how it works

  • Importance of protecting valuable data from ransomware, accidental or malicious deletion, damaged or stolen workstations

  • What is an image-based backup and how does it work

 

Microsoft does not protect you from data loss due to deprovisioned user accounts.

Recover from a ransomware attack in Microsoft 365

The steps in this article will give you the best chance to recover data and stop the internal spread of infection.

Microsoft Services Agreement

These terms (the "Terms") govern the use of those Microsoft products, websites, and services listed.


 
 
 

Get your copy of the latest InfoSec Maturity Roadmap 2023 Edition and see where your company stands and what your next steps should be!

View Event →
Access up to $15,000 in government funding to boost your business' IT through Canada Digital Adoption Program (CDAP)
Dec
5
to Dec 20

Access up to $15,000 in government funding to boost your business' IT through Canada Digital Adoption Program (CDAP)

Learn how to get access of up to $15,000 of digital adoption advisory services from the Federal Government to boost your business' IT. As an approved Digital Advisor, Interware will help you acquire the limited-time grant, which you can take advantage of to reduce the risk of attack and improve overall security.

This grant is on a first come, first-serve basis, which means you have to act NOW as the $4 billion dollar pool of funds is running low.

How does the program work? Hear directly from Interware as an approved digital advisor!

Note, to be eligible for the grant, you must:

  • Be an incorporated business (either at the national or provincial level) OR a Canadian resident sole proprietor

  • Be a privately-owned, for-profit entity

  • Have a maximum of 499 full-time equivalent employees

  • Have earned between $500,000 and $100,000,000 in revenue in at least one of the past 3 years

View Event →
Learn how the Government of Canada can subsidize your next cybersecurity project with Interware
Oct
25
3:30 PM15:30

Learn how the Government of Canada can subsidize your next cybersecurity project with Interware

Let Interware help you subsidize your next cybersecurity project for a value up to $15,000! As an approved Digital Advisor for the Government of Canada, Interware has access to a limited-time grant, which we want you to take advantage of to help reduce the risk of attack and improve overall security.

How does the Boost Your Business Grant work? Hear directly from Interware as an approved digital advisor to learn more!

Note, to be eligible for the grant, you must:

  • Be an incorporated business (either at the national or provincial level) OR a Canadian resident sole proprietor

  • Be a privately-owned, for-profit entity

  • Have a maximum of 499 full-time equivalent employees

  • Have earned between $500,000 and $100,000,000 in revenue in at least one of the past 3 years

View Event →
#BeCyberSmart with Interware's Email Security and Phishing Training
Oct
12
2:30 PM14:30

#BeCyberSmart with Interware's Email Security and Phishing Training

 

This session is meant for end-users to help them better understand email security, as well as ways they can avoid and protect themselves from phishing attacks.

 

The #1 biggest security threat to any organization is their employees. Without proper training, it's not a matter of if, but WHEN.

 

In this webinar, we will discuss:

- What is phishing?

- Threat landscape

- Case Study: Uber

- Real life phishing examples

- Different tricky ways you could be phished

- Industry best practices when receiving a phishing email

View Event →
What Every CIO Must Know: Privacy - Expectations, Terms, and Tools
Sep
20
1:30 PM13:30

What Every CIO Must Know: Privacy - Expectations, Terms, and Tools

This webinar will cover important information all business executives should know about privacy data and how it should be stored, protected, and regulated by laws.

Our guest speaker, Sanjay, is a professional industry expert with 25 years of experience. He will discuss tips a CIO must know that are sure to help your organization meet data privacy and security expectations.

After this event, you will learn about:

- Privacy laws such as GDPR, CCPA, PIPEDA, etc.

- How data should be captured, stored, and what the required outputs are.

- How the CIO should best coordinate with a Data Privacy Officer or Chief Risk Officer.

View Event →
In-Person Training: Creating a Comprehensive Security Fabric
Aug
16
11:00 AM11:00

In-Person Training: Creating a Comprehensive Security Fabric

Let's get technical!


Participants who attended this workshop learned how:

  • Introduce the Fortinet Security Fabric and discuss the main business drivers

  • Detail specific components that make up the Fortinet Security Fabric

  • Build a comprehensive solution to prevent, detect and respond to security incidents using the broad, integrated, and automated approach

View Event →
12 Ways Multi-Factor Authentication can be Hacked and How to Defend Against It
Jun
8
12:00 PM12:00

12 Ways Multi-Factor Authentication can be Hacked and How to Defend Against It

Multi-factor Authentication (MFA) is NOT an option, but a MUST. Risk reduction and layered defense are critical for protecting your organization against the alarming number of cyber attacks. But did you know MFA can also be hacked?

This webinar discusses the many ways multi-factor authentication can be hacked and how to best defend against it. It includes a hacking demo by Kevin Mitnick and successful examples of every attack type.

Join us and be a better computer security defender as we talk about:
- Types of MFA hacks
- Different demo attacks for unsecure MFA
- Tips on choosing the best MFA and how to defend it

Get inside the mind of the hacker, learn their techniques, and use the best way to defend your organization's MFA before it's too late.

REGISTER BELOW TO DOWNLOAD ROGER GRIME’S PRESENTATION.

View Event →
Learn how to Forensically Examine Phishing Emails
May
18
1:30 PM13:30

Learn how to Forensically Examine Phishing Emails

Cyber crime has become an arms race where the bad guys constantly evolve their attacks while you, the vigilant defender, must diligently expand your know how to prevent intrusions into your network.

Staying a step ahead may even involve becoming your own cyber crime investigator, forensically examining actual phishing emails to determine the who, the where, and the how.

In this live webinar, Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, shows you how to become a digital private investigator! You’ll learn:

  • How to forensically examine phishing emails and identify other types of social engineering

  • What forensic tools and techniques you can use right now

  • How to investigate rogue smishing, vishing, and social media phishes

  • How to enable your users to spot suspicious emails sent to your organization

Get inside the mind of the hacker, learn their techniques, and how to spot phishing attempts before it’s too late!

View Event →
A Comprehensive Guide to a Strong and Reliable Zero-Trust Strategy
Apr
20
2:00 PM14:00

A Comprehensive Guide to a Strong and Reliable Zero-Trust Strategy

Traditional security models operate under the assumption that everything inside the organization's network should be trusted. However, automatically extending trust to any device or user intentionally or unintentionally puts the organization at risk and becomes compromised. That is why many security leaders are turning to a zero-trust approach to identify, authenticate, and monitor users and devices, both on and off the network.

 

A zero-trust strategy shifts the fundamental paradigm of open networks built around inherent trust to one that delivers on the zero-trust principles by:

-          Knowing who is on the network

-          Knowing what is on the network

-          Providing on-net and off-net protection

-          Enforce application access management

 

View Event →
4 Essential Steps to Becoming Cyber-Resilient With Fortinet
Jan
26
2:00 PM14:00

4 Essential Steps to Becoming Cyber-Resilient With Fortinet

Ransomware is Here to Stay.

In order to fight the rapidly growing Ransomware - businesses need a comprehensive solution that is simple, straightforward, and affordable. During this session, we will discuss essential Fortinet solutions that will:

- Prevent Phishing and Other Email-initiated Attacks

- Stop Malicious Files and Communications on the Network

- Protect against ransomware at the Endpoint

- Prevent Advanced Threats and Automate Threat-intelligence Sharing

View Event →
Breakthrough Solutions in Endpoint Security: The Future of the Hybrid Workforce
Dec
8
2:00 PM14:00

Breakthrough Solutions in Endpoint Security: The Future of the Hybrid Workforce

Endpoint security is the practice of securing endpoints or entry points of end-user devices such as desktops, laptops, mobile devices, and even printers from being exploited by malicious acts. With our Advanced Endpoint Security protections, you can now choose and be safely connected with any devices from anywhere, anytime!

We will provide you a better understanding of:

- Importance of Endpoint Security

- Choosing the best Endpoint Protection Platform

View Event →