CISO's Guide to Spear Phishing DefenseJoseph Opacki of PhishLabs on How to Respond to Relentless Attacks
Everyone's talking about business email compromise, but what they aren't talking enough about is what's at the root of these attacks - spear phishing. Joseph Opacki of PhishLabs discusses how security leaders must respond to the threat.
"Most organizations have email security and spam filtering tools, but attackers have gotten good at slipping their emails past these technologies," says Opacki, VP of Threat Research at PhishLabs. "Once it reaches the victim's inbox, it's up to the user to recognize it as a scam and report it to the right people internally."
And that is where traditional defenses often fall apart. Which is why a new approach to spear phishing defense is necessary.
In an interview about how to respond to spear phishing attacks, Opacki discusses:
- Why these attacks remain so successful;
- Essential tools for spear phishing defense;
- Elements of a defensive framework.
To learn more, download the The CISO's Guide to Spear Phishing Defense
Mr. Joseph Opacki serves as the Vice President of Threat Research at PhishLabs. Prior to joining PhishLabs, Mr. Opacki was the Senior Director of Global Research at iSIGHT Partners and was also an adjunct professor at George Mason University where he taught malware reverse engineering in the master's program of computer forensics. Mr. Opacki has also participated in numerous industry advisory councils including the Cybersecurity Curriculum Advisory Council at the University of Maryland University College.
Before his career in the private sector, Mr. Opacki was the malware reverse engineering Subject Matter Expert (SME) and the Technical Director of advanced digital forensics in the Operational Technology Division at the Federal Bureau of Investigation. In 2011, Mr. Opacki was awarded the FBI Director's Award of Excellence for Outstanding Technical Advancement and in 2012 he was awarded the Office of the Director of National Intelligence's Science and Technology Team Award, both for his work in the area of enterprise-level malware triage and investigation.