Hi [[ session.user.profile.firstName ]]

CYREN Webinars

  • Date
  • Rating
  • Views
  • Phishing Security for Enterprises using Office 365
    Phishing Security for Enterprises using Office 365
    Michael Osterman, Principal Analyst, Osterman Research and Pete Starr, Senior Director of Solution Engineering, Cyren Recorded: Mar 7 2019 58 mins
    About this live webinar
    The Microsoft Office 365 platform currently blocks over 5 billion phishing messages a year. But as mass and targeted phishing attacks increase in volume, speed and evasiveness, is additional protection needed to secure Office 365 email for your organization?

    To answer this question, Osterman Research’s principal analyst will share insights from a recent study of Office 365 deployments, and Cyren’s global director of solution engineering will walk through the phishing kill chain and point to practical opportunities to enhance defences.


    What you will learn

    This webinar provides IT and security professionals the opportunity to understand phishing security issues for Office 365 deployments. Takeaways will include:
    •What is the current experience of Office 365 deployments in terms of phishing security?
    •What are typical limitations for Office 365 deployments in dealing with today’s phishing threat landscape?
    •Considering how phishing attacks work, what countermeasures are available at each stage?
    •What are 10 steps organizations using Office 365 can take to stop phishing attacks?
  • Top 5 Office 365 Phishing Kits to Watch For
    Top 5 Office 365 Phishing Kits to Watch For
    Magni Sigurdsson - Senior Threat Researcher, Cyren Recorded: Feb 28 2019 51 mins
    Have you noticed an uptick in phishing traffic reaching your company’s users? Been impressed by the sophistication of so many phishing sites? Phishing has become an industry, with new services and sophisticated turn-key “phishing kits” allowing nearly anyone to develop sophisticated attacks.

    In this webinar, senior threat researcher Magni Sigurdsson will share the latest findings on phishing kits, including which brands are the most targeted, and go in-depth on the five most-used phishing kits, showing actual examples, reviewing the mechanics of how they work—including the evasive tactics utilized to evade detection—and explaining how both users and security systems can recognize them.

    What You Will Learn
    This webinar provides IT and security professionals from network admins to CISO’s the opportunity to understand the latest techniques being used by phishing sites to lure in users, and to get up to speed on the tactics of the top phishing kits being utilized. Takeaways will include:
    • What are the top phishing kits today in terms of “market share” that users are likely to encounter?
    • What brands are being targeted by the phishing kit industry?
    • What techniques are being applied to phishing web sites and phishing campaigns in general) to evade detection?
    • How can users identify the most sophisticated phishing web sites? How can security systems do so?
    • What are the key phishing trends to look out for in 2019?
  • Geschicktes Phishing zielt auf Office 365: Was Sie wissen sollten!
    Geschicktes Phishing zielt auf Office 365: Was Sie wissen sollten!
    Marcel Leitel, Sales Engineer DACH Cyren Recorded: Dec 6 2018 56 mins
    Ist Ihnen ein Anstieg an Phishing-Verkehr, der Ihre Mitarbeitern erreicht, aufgefallen? Phishing ist eine Industrie geworden, mit neuen Methoden und neuen „Dark Web“-Diensten, die immer schwerer zu erkennen sind und schon durch das bloße Volumen von Massen- und gezielten Phishings auffallen.

    In diesem Webinar wird Marcel Leitel, die neuen Phishing-Technologien erläutern wie auch Beispiele von auf Office-365 zielende Phishing-Kampagnen aufzeigen. Erfahren Sie, wie die heutige Phishing-Industrie funktioniert und gleichen Sie diese Entwicklungen mit den Ergebnissen einer neuen Untersuchung zu Office-365 ab, die Office-365-Administratoren und IT-Manager bei der Auswahl der verschiedenen Sicherheitskonzepte unterstützt.

    Dieses Webinar bietet IT- und Sicherheits- Spezialisten die Möglichkeit, dass bei Office 365 eingesetzte Phishing Phänomen zu verstehen und das Wissen bei der Auswahl ihrer Firmen-Sicherheitsstrategie anzuwenden. Kernlernpunkte sind:

    - Welche Phishing Kampagnen zielen heute auf Office 365? Wie sehen diese aus und wie funktionieren sie?
    - Welche neuesten Techniken werden von Phishing-Kampagnen eingesetzt, um Erkennung zu verhindern?
    - Welche Phishing-Dienste werden im Dark Web angeboten und welche Office 365 ‚phishing kits‘ werden verkauft?
    - Erreichen mehr Massen-Phishings und gezielte Phishing-Kampagnen Office 365 Nutzer und wenn ja, um wie viel ist dies in den letzten 12 Monaten angestiegen?
  • Confronting the Ransomware Crisis: Best Practices for Securing Your Business
    Confronting the Ransomware Crisis: Best Practices for Securing Your Business
    Dan Maier, VP Marketing Recorded: Dec 5 2018 44 mins
    Ransomware such as CryptoLocker, CryptoWall and Locky are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defenses. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    View this on-demand webinar broadcast to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Evasive Phishing Targeting Office 365: What You Need to Know
    Evasive Phishing Targeting Office 365: What You Need to Know
    Magni Sigurdsson, Senior Threat Researcher, Cyren and Duncan Mills, Director of Product, Cyren Recorded: Dec 3 2018 46 mins
    About This Live Webinar
    Have you noticed an uptick in phishing traffic reaching your company’s users? Phishing has become an industry, with new methods appearing and new “dark web” services increasing the evasiveness and sheer volume of both mass and targeted phishing threats.

    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from real-world security performance assessments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.

    What You Will Learn:
    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from a recent survey of Office 365 deployments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.
    Takeaways will include:
    • What phishing campaigns are targeting Office 365 today, what do they look like, and how do they work?
    • What are the latest techniques being used in phishing campaigns to avoid detection?
    • What phishing services are now being provided on the dark web, and what Office 365 credential “phishing kits” are being sold?
    • Are more mass-mailed phishing and targeted phishing campaigns reaching Office 365 users, and if so, by how much has each increased during the past 12 months?
  • Phishing Security for Office 365
    Phishing Security for Office 365
    Michael Osterman, Principal Analyst, Osterman Research and Pete Starr, Senior Director of Solution Engineering, Cyren Recorded: Nov 29 2018 59 mins
    About this live webinar
    The Microsoft Office 365 platform currently blocks over 5 billion phishing messages a year. But as mass and targeted phishing attacks increase in volume, speed and evasiveness, is additional protection needed to secure Office 365 email for your organization?

    To answer this question, Osterman Research’s principal analyst will share insights from a recent study of Office 365 deployments, and Cyren’s global director of solution engineering will walk through the phishing kill chain and point to practical opportunities to enhance defences.


    What you will learn

    This webinar provides IT and security professionals the opportunity to understand phishing security issues for Office 365 deployments. Takeaways will include:
    •What is the current experience of Office 365 deployments in terms of phishing security?
    •What are typical limitations for Office 365 deployments in dealing with today’s phishing threat landscape?
    •Considering how phishing attacks work, what countermeasures are available at each stage?
    •What are 10 steps organizations using Office 365 can take to stop phishing attacks?
  • Email Security: Why It Probably Isn’t Working, and What To Do
    Email Security: Why It Probably Isn’t Working, and What To Do
    Michael Osterman of Osterman Research Recorded: Nov 26 2018 48 mins
    Why is email security back on everybody’s agenda?
    Why do email security solutions seem to be improving only slightly in certain areas, and getting worse in others? Or is that not true?
    In the midst of the current phishing and ransomware epidemic, security must get better – but how?

    View this on-demand webinar to hear Michael Osterman of Osterman Research share the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.
  • Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Dan Maier, VP of Marketing at Cyren Recorded: Nov 16 2018 44 mins
    Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Is It Time to Move Your Security to the Cloud?
    Is It Time to Move Your Security to the Cloud?
    Dan Maier, VP of Marketing at Cyren Recorded: Nov 13 2018 39 mins
    Despite spending an estimated $85B on security in 2016, the volume of malicious attacks has grown dramatically, billions of records have been stolen, and data breaches are at an all-time high.

    The traditional choice for internet security used to be appliances deployed at the network perimeter, but the world has changed, and this model is not working as well as it used to.

    View this on-demand webinar to learn about the challenges that a cloud first, mobile first world poses for legacy security appliances, and the benefits that a cloud-based approach to security can deliver.
  • Email Security Gap Analysis: How Do You Know Your Security Is Working?
    Email Security Gap Analysis: How Do You Know Your Security Is Working?
    Tom McNash, Senior Solution Engineer Recorded: Nov 8 2018 43 mins
    A decade ago, email threats were well understood and reasonably under control, leading email security to become “commoditized” and vendors to diversify into other services, losing focus on security. This lack of investment and innovation in email security is evident in the success of modern threats like ransomware and phishing, and begs the question ‘How much malware, phishing and spam is really getting through to my users?’

    Cyren has developed a free Email Security Gap Analysis test in order to measure how well a company’s in-place security is performing relative to detection by Cyren’s global security cloud, and recently published a report with aggregated data on results from assessments done in September and October. The webinar will cover a discussion of the findings in that report, additional insights and threat examples uncovered during assessments (appropriately anonymized), and how to have your own gap analysis done.

    Participants in the webinar will come away with a sense of:

    - How much spam, malware and phishing are current email security systems missing?
    - What was the range of results for different assessment participants, considering different case studies?
    - What factors drive higher or lower “miss” rates for malicious emails, even for systems provided by the same security vendor?
    - What might be an expectation for my own company’s security?
    - How is an email gap analysis conducted?
    - What is involved in terms of configuration and are there any impacts to current email operations?
    - How can I arrange to run an Email Security Gap Analysis for my own company?
    - What are the eligibility requirements?

Embed in website or blog