Hi [[ session.user.profile.firstName ]]

CYREN Webinars

  • Date
  • Rating
  • Views
  • Reducing the Risk of Phishing Attacks
    Reducing the Risk of Phishing Attacks Derek Brink, Aberdeen Recorded: Sep 18 2018 43 mins
    Within the first 24 hours of a phishing attack, attackers hook virtually 100% of their victims. And these attacks are only growing more sophisticated and dangerous. To truly protect your business, you have to get in front of phishing attacks and stop them in as little time as possible.

    In this invaluable webinar, Aberdeen’s Derek Brink reveals what the risks from phishing attacks to your business truly are, and the strategies the Best-in-Class use to reduce those risks as much as possible.

    What You Will Learn
    - What happens in the first 60 minutes of a phishing attack
    - Why relying on browser-based protection is not enough
    - Why an investment in advanced email and web security pays off
    - How the Best-in-Class invest in technology that operates faster than both users and attackers
  • Is Your Web Security Working? How to Test and Tune Your Web Security
    Is Your Web Security Working? How to Test and Tune Your Web Security John DiTroia, Chief Architect of the Web Security Diagnostic Recorded: Sep 7 2018 40 mins
    Cyren’s Web Security Diagnostic, which in less than 30 seconds tests vulnerability to a series of threats like basic and advanced viruses, phishing URLs, botnet calls, and malware hidden in HTTPS traffic has been run by thousands of IT and security professionals and their users to assess the performance of their web gateway security. Test your web security today.
  • “Fileless” Ransomware: The Next Big Thing?
    “Fileless” Ransomware: The Next Big Thing? Arna Magnusardottir - Senior Malware Researcher Recorded: Sep 7 2018 45 mins
    This webinar presentation by Arna Magnusardottir, Senior Malware Researcher at Cyren, will provide an end-to-end look at fileless ransomware attacks and show how they fit into the current ransomware landscape. Using real-world examples, she will cover the range of techniques in use, common attack vectors, and strategies for defense for IT and security managers.
  • Email Security Gap Analysis: How Do You Know Your Security Is Working?
    Email Security Gap Analysis: How Do You Know Your Security Is Working? Tom McNash, Senior Solution Engineer Recorded: Aug 31 2018 43 mins
    A decade ago, email threats were well understood and reasonably under control, leading email security to become “commoditized” and vendors to diversify into other services, losing focus on security. This lack of investment and innovation in email security is evident in the success of modern threats like ransomware and phishing, and begs the question ‘How much malware, phishing and spam is really getting through to my users?’

    Cyren has developed a free Email Security Gap Analysis test in order to measure how well a company’s in-place security is performing relative to detection by Cyren’s global security cloud, and recently published a report with aggregated data on results from assessments done in September and October. The webinar will cover a discussion of the findings in that report, additional insights and threat examples uncovered during assessments (appropriately anonymized), and how to have your own gap analysis done.

    Participants in the webinar will come away with a sense of:

    - How much spam, malware and phishing are current email security systems missing?
    - What was the range of results for different assessment participants, considering different case studies?
    - What factors drive higher or lower “miss” rates for malicious emails, even for systems provided by the same security vendor?
    - What might be an expectation for my own company’s security?
    - How is an email gap analysis conducted?
    - What is involved in terms of configuration and are there any impacts to current email operations?
    - How can I arrange to run an Email Security Gap Analysis for my own company?
    - What are the eligibility requirements?
  • Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks Dan Maier, VP of Marketing at Cyren Recorded: Aug 29 2018 44 mins
    Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
  • How Changing Malware is Changing Security
    How Changing Malware is Changing Security Fridrik Skulason, VP - AV Technology at Cyren Recorded: Aug 28 2018 56 mins
    In this webinar, Avi Turiel interviews Fridrik Skulason, an early pioneer in anti-virus technology, as he gives his perspective on how malware has changed since his FRISK Software released the first anti-virus product in 1989.
    Webinar participants will come away from the session with an expert’s perspective on the current global malware landscape, including:

    • The evolution of malware to the present, and what to expect in the near and distant future
    • What is the “malware economy,” and what has changed about the motivation of the malware authors behind today’s threats
    • A breakdown of the families of threats we are currently confronting, and which are of the greatest concern
    • What design and distribution techniques malware authors use today to try to evade detection
    • What it takes for security systems to succeed today, and what capabilities to look for in security solutions
  • Is It Time to Move Your Security to the Cloud?
    Is It Time to Move Your Security to the Cloud? Dan Maier, VP of Marketing at Cyren Recorded: Aug 24 2018 39 mins
    Despite spending an estimated $85B on security in 2016, the volume of malicious attacks has grown dramatically, billions of records have been stolen, and data breaches are at an all-time high.

    The traditional choice for internet security used to be appliances deployed at the network perimeter, but the world has changed, and this model is not working as well as it used to.

    View this on-demand webinar to learn about the challenges that a cloud first, mobile first world poses for legacy security appliances, and the benefits that a cloud-based approach to security can deliver.
  • Protecting Users from Business Email Compromise Attacks
    Protecting Users from Business Email Compromise Attacks Pete Starr - Global Director of Solutions Engineering Recorded: Aug 13 2018 26 mins
    Targeted phishing attacks are a growing concern—in a recently concluded survey of IT and security managers, they estimate the volume of such attacks evading detection of their current security and reaching their users is up 18% over the past 12 months. Join email security industry veteran Pete Starr, Cyren’s Global Director of Solution Engineering, for a half-hour pointed review of the latest developments in Business Email Compromise, attack methods and examples, and how best to prevent them.

    What You Will Learn:

    Participants in the webinar will come away with insight into:

    - What is BEC and how is an attack usually developed?
    - What are the different email spoofing methods employed in such attacks?
    - What kind of special challenges does targeted phishing pose to security solutions?
    - What kind of countermeasures are needed in an impostor protection solution?
  • IT Security in the UK & Ireland: 2018 Business Survey
    IT Security in the UK & Ireland: 2018 Business Survey Michael Osterman and John Callon Recorded: Aug 8 2018 40 mins
    Benchmark your IT organisation’s performance and priorities for web and email security in the UK and Ireland (UKI) against responses from your peers. Michael Osterman, founder and principal analyst at Osterman Research, will share his findings from a just-concluded in-depth survey of IT and security professionals at over 100 small and mid-sized companies and governmental organisations in the UKI with 100 to 3,000 employees.

    Participants in the webinar will come away with a sense of:

    - How many organisations in the region have suffered an infection or security breach in the past year, which threats are most prevalent, and how does this compare to the 2017 survey result?

    - What percentage of IT managers currently prefer on-premises security solutions versus cloud-based security, and what is the trend over time?

    - How do IT security decision-makers and influencers rate their current security solution with respect to 11 different threat scenarios?

    - What percentage of organisations have increased IT security spending during the past 12 months, and by how much?

    - What are the features most sought in evaluating new web and email security solutions, and how do they vary for small and large organisations?

    - What threats are of greatest concern, and how prepared do companies think they are at stopping them?

    - Is inspecting HTTPS traffic for threats now a widespread practice?

    - What kind of countermeasures are needed in an impostor protection solution?
  • Intro to Cyren, the world’s largest security cloud
    Intro to Cyren, the world’s largest security cloud 2 minute video Recorded: Aug 2 2018 2 mins
    Internet security is a race against time. Watch our 2 minute overview video and find out how Cyren can help.

Embed in website or blog