Optimize your Company's Security
Secure your organization with confidence, no matter your budget, we’re here to help you optimize your cybersecurity. Fill out the form to take the first step toward stronger protection and peace of mind. Let’s work together to stay ahead of threats!
Resources Mentioned
Have I been Pwned: https://haveibeenpwned.com/
Fundamentals Training: https://get.endsight.net/monthly-cybersecurity-fundamentals-training
AI Office Hours: https://www.endsight.net/development/webinar
Last Security Office Hours: https://www.endsight.net/sec/cyber-threats-you-cant-ignore
Security Video Library: https://www.endsight.net/security-shorts
Endsight YouTube Channel: https://www.youtube.com/@EndsightIT
CISA Shutdown: https://deafnews.it/en/article/shutdown-cisa-cyber-difesa-usa-in-stand-by-per-mancanza-fondi
Claude Code Leak: https://www.theregister.com/2026/03/31/anthropic_claude_code_source_code/
Aura Breach: https://www.pcmag.com/news/no-the-aura-data-breach-did-not-expose-your-ssn-password-heres-what-happened
Oracle Hack: https://www.insurancejournal.com/news/national/2025/04/04/818458.htm
Co-op Shutdown: https://www.theguardian.com/business/2025/apr/30/co-op-forced-to-shut-down-part-of-it-system-after-hack-attempt
Marks and Spencer Incident: https://www.theguardian.com/business/2025/apr/22/marks-and-spencer-apologises-cyber-incident-contactless-payments-online-orders?
Overview
Quarterly Office Hours + Q&A
On-Demand Recording | April 30th 2026
The Human Risk Era: How AI and Phishing Are Reshaping Cybersecurity
Cybersecurity isn’t standing still, and neither are the risks facing your business. Each quarter introduces new attack methods, evolving vulnerabilities, and real-world incidents that reshape how organizations need to think about security.
The challenge isn’t just keeping up with the news. It’s understanding what actually matters and what actions to take.
In this session, we break down key cybersecurity events from the past quarter. From AI-driven attacks to high-profile breaches, each example is translated into clear, practical insights you can apply immediately. You’ll gain a stronger understanding of how the threat landscape is evolving and how to respond with confidence.
This is a strategic session designed for IT professionals, managers, and business decision-makers who want clarity, not noise, and actionable guidance they can put into practice.
What You’ll Learn
-
AI exposure and vendor risk: A breakdown of the Anthropic Claude Code incident and what it reveals about human error, developer tools, and how to evaluate vendor security practices.
- AI-powered attacks in practice: How attackers are using AI in real-world scenarios, including large-scale compromises like Fortinet, and how this differs from past automation.
- Interpreting “no data exposed” claims: What vendors really mean when they say sensitive data was not accessed and how to assess risk beyond the headline.
- Global scam operations at scale: How organized scam centers are evolving into highly efficient systems targeting both individuals and businesses.
- Rethinking vendor trust and accountability: Why no provider is immune to incidents and how to approach vendor validation more effectively.
- Actionable cybersecurity tips for businesses: Practical steps to strengthen security across people, process, and technology based on current threat patterns.
What This Session Covers
-
Key threat trends from the past quarter.
-
What changed in the cybersecurity landscape.
-
Strategic implications for your organization.
-
Practical next steps you can take immediately.
-
Audience Q&A from the live session.
Speaker
Stephen Hicks
Security Practice Manager @ Endsight
Stephen has spent his entire professional career in the technology industry. He holds an MBA from Saint Mary's College and just over a dozen technical certifications including advanced cybersecurity certifications CISSP and CISM. He has a second-degree black belt in Shito Ryu Karate and loves to scuba and ski.