People Make the Best Exploits. It’s no secret that attackers have made a massive transition from targeting infrastructure to targeting people: over 90% of cyberattacks now start with an email, a social media link, or a malicious mobile app. From ransomware to more targeted attacks to BEC, cyber adversaries rely on social engineering to get people to run their malicious code, turn over their credentials, or even directly send them information or money. Join this session to learn how organization can adopt a threat intelligence-driven prevention and response strategy to protect the weakest link in the security chain: their people.