Inbox Monitoring and Phishing Remediation – Intro to Torq
In this installation of our Intro to Torq webinar series, we unpack the deceptive simplicity of phishing and show how the no-code security automation platform can help reduce incident response times, minimize the need for human intervention, and improve your organization’s ability to proactively address email phishing.
Explore how to reduce phishing incident response times, minimize the need for human intervention, and improve your organization’s ability to proactively address email threats with no-code automation in this installation of our Intro to Torq webinar series.
It’s been reported that 88% of all data breaches are caused by human error. Even the most security-aware employees are still susceptible to mistakes, especially when it comes to social engineering and the ubiquitous phishing email.
But as anyone who has dared look in their spam folder knows, for every one successful phishing attempt, there are thousands of unsuccessful attempts. The work of sorting out ridiculous from dangerous can be partially reduced with email security tools and spam filters. But that still leaves dozens—if not hundreds—of alerts that need to be investigated by an analyst. This can quickly overwhelm a security team and makes it very difficult to scale security operations.
Join Torq Field CTO Marco Garcia as he presents a few examples of successful phishing attacks and discusses why they continue to work. We’ll look at ways to identify malicious emails and detect indicators of compromise (IOC), including factors that could affect your organization’s threshold for incident response. Of course, we will also cover best practices for response, including data enrichment, quarantine and detonation, and communications management.
In the 30-minute presentation, you’ll learn:
- How to use Torq to monitor email inboxes and initiate phishing incident response
- The types of variables that can be used to build a workflow within Torq
- Ways to integrate Torq with other security tools involved with phishing response, like endpoint detection and response (EDR) and security information and event management (SIEM) solutions