Hi [[ session.user.profile.firstName ]]

CYREN Webinars

  • Date
  • Rating
  • Views
  • Geschicktes Phishing zielt auf Office 365: Was Sie wissen sollten!
    Geschicktes Phishing zielt auf Office 365: Was Sie wissen sollten!
    Marcel Leitel, Sales Engineer DACH Cyren Recorded: Dec 6 2018 56 mins
    Ist Ihnen ein Anstieg an Phishing-Verkehr, der Ihre Mitarbeitern erreicht, aufgefallen? Phishing ist eine Industrie geworden, mit neuen Methoden und neuen „Dark Web“-Diensten, die immer schwerer zu erkennen sind und schon durch das bloße Volumen von Massen- und gezielten Phishings auffallen.

    In diesem Webinar wird Marcel Leitel, die neuen Phishing-Technologien erläutern wie auch Beispiele von auf Office-365 zielende Phishing-Kampagnen aufzeigen. Erfahren Sie, wie die heutige Phishing-Industrie funktioniert und gleichen Sie diese Entwicklungen mit den Ergebnissen einer neuen Untersuchung zu Office-365 ab, die Office-365-Administratoren und IT-Manager bei der Auswahl der verschiedenen Sicherheitskonzepte unterstützt.

    Dieses Webinar bietet IT- und Sicherheits- Spezialisten die Möglichkeit, dass bei Office 365 eingesetzte Phishing Phänomen zu verstehen und das Wissen bei der Auswahl ihrer Firmen-Sicherheitsstrategie anzuwenden. Kernlernpunkte sind:

    - Welche Phishing Kampagnen zielen heute auf Office 365? Wie sehen diese aus und wie funktionieren sie?
    - Welche neuesten Techniken werden von Phishing-Kampagnen eingesetzt, um Erkennung zu verhindern?
    - Welche Phishing-Dienste werden im Dark Web angeboten und welche Office 365 ‚phishing kits‘ werden verkauft?
    - Erreichen mehr Massen-Phishings und gezielte Phishing-Kampagnen Office 365 Nutzer und wenn ja, um wie viel ist dies in den letzten 12 Monaten angestiegen?
  • Confronting the Ransomware Crisis: Best Practices for Securing Your Business
    Confronting the Ransomware Crisis: Best Practices for Securing Your Business
    Dan Maier, VP Marketing Recorded: Dec 5 2018 44 mins
    Ransomware such as CryptoLocker, CryptoWall and Locky are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defenses. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    View this on-demand webinar broadcast to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Evasive Phishing Targeting Office 365: What You Need to Know
    Evasive Phishing Targeting Office 365: What You Need to Know
    Magni Sigurdsson, Senior Threat Researcher, Cyren and Duncan Mills, Director of Product, Cyren Recorded: Dec 3 2018 46 mins
    About This Live Webinar
    Have you noticed an uptick in phishing traffic reaching your company’s users? Phishing has become an industry, with new methods appearing and new “dark web” services increasing the evasiveness and sheer volume of both mass and targeted phishing threats.

    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from real-world security performance assessments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.

    What You Will Learn:
    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from a recent survey of Office 365 deployments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.
    Takeaways will include:
    • What phishing campaigns are targeting Office 365 today, what do they look like, and how do they work?
    • What are the latest techniques being used in phishing campaigns to avoid detection?
    • What phishing services are now being provided on the dark web, and what Office 365 credential “phishing kits” are being sold?
    • Are more mass-mailed phishing and targeted phishing campaigns reaching Office 365 users, and if so, by how much has each increased during the past 12 months?
  • Phishing Security for Office 365
    Phishing Security for Office 365
    Michael Osterman, Principal Analyst, Osterman Research and Pete Starr, Senior Director of Solution Engineering, Cyren Recorded: Nov 29 2018 59 mins
    About this live webinar
    The Microsoft Office 365 platform currently blocks over 5 billion phishing messages a year. But as mass and targeted phishing attacks increase in volume, speed and evasiveness, is additional protection needed to secure Office 365 email for your organization?

    To answer this question, Osterman Research’s principal analyst will share insights from a recent study of Office 365 deployments, and Cyren’s global director of solution engineering will walk through the phishing kill chain and point to practical opportunities to enhance defences.


    What you will learn

    This webinar provides IT and security professionals the opportunity to understand phishing security issues for Office 365 deployments. Takeaways will include:
    •What is the current experience of Office 365 deployments in terms of phishing security?
    •What are typical limitations for Office 365 deployments in dealing with today’s phishing threat landscape?
    •Considering how phishing attacks work, what countermeasures are available at each stage?
    •What are 10 steps organizations using Office 365 can take to stop phishing attacks?
  • Email Security: Why It Probably Isn’t Working, and What To Do
    Email Security: Why It Probably Isn’t Working, and What To Do
    Michael Osterman of Osterman Research Recorded: Nov 26 2018 48 mins
    Why is email security back on everybody’s agenda?
    Why do email security solutions seem to be improving only slightly in certain areas, and getting worse in others? Or is that not true?
    In the midst of the current phishing and ransomware epidemic, security must get better – but how?

    View this on-demand webinar to hear Michael Osterman of Osterman Research share the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.
  • Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks
    Dan Maier, VP of Marketing at Cyren Recorded: Nov 16 2018 44 mins
    Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Is It Time to Move Your Security to the Cloud?
    Is It Time to Move Your Security to the Cloud?
    Dan Maier, VP of Marketing at Cyren Recorded: Nov 13 2018 39 mins
    Despite spending an estimated $85B on security in 2016, the volume of malicious attacks has grown dramatically, billions of records have been stolen, and data breaches are at an all-time high.

    The traditional choice for internet security used to be appliances deployed at the network perimeter, but the world has changed, and this model is not working as well as it used to.

    View this on-demand webinar to learn about the challenges that a cloud first, mobile first world poses for legacy security appliances, and the benefits that a cloud-based approach to security can deliver.
  • Email Security Gap Analysis: How Do You Know Your Security Is Working?
    Email Security Gap Analysis: How Do You Know Your Security Is Working?
    Tom McNash, Senior Solution Engineer Recorded: Nov 8 2018 43 mins
    A decade ago, email threats were well understood and reasonably under control, leading email security to become “commoditized” and vendors to diversify into other services, losing focus on security. This lack of investment and innovation in email security is evident in the success of modern threats like ransomware and phishing, and begs the question ‘How much malware, phishing and spam is really getting through to my users?’

    Cyren has developed a free Email Security Gap Analysis test in order to measure how well a company’s in-place security is performing relative to detection by Cyren’s global security cloud, and recently published a report with aggregated data on results from assessments done in September and October. The webinar will cover a discussion of the findings in that report, additional insights and threat examples uncovered during assessments (appropriately anonymized), and how to have your own gap analysis done.

    Participants in the webinar will come away with a sense of:

    - How much spam, malware and phishing are current email security systems missing?
    - What was the range of results for different assessment participants, considering different case studies?
    - What factors drive higher or lower “miss” rates for malicious emails, even for systems provided by the same security vendor?
    - What might be an expectation for my own company’s security?
    - How is an email gap analysis conducted?
    - What is involved in terms of configuration and are there any impacts to current email operations?
    - How can I arrange to run an Email Security Gap Analysis for my own company?
    - What are the eligibility requirements?
  • Evasive Phishing Targeting Office 365: What You Need to Know
    Evasive Phishing Targeting Office 365: What You Need to Know
    Magni Sigurdsson, Senior Threat Researcher, Cyren and Duncan Mills, Director of Product, Cyren Recorded: Oct 25 2018 46 mins
    About This Live Webinar
    Have you noticed an uptick in phishing traffic reaching your company’s users? Phishing has become an industry, with new methods appearing and new “dark web” services increasing the evasiveness and sheer volume of both mass and targeted phishing threats.

    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from real-world security performance assessments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.

    What You Will Learn:
    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from a recent survey of Office 365 deployments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.
    Takeaways will include:
    • What phishing campaigns are targeting Office 365 today, what do they look like, and how do they work?
    • What are the latest techniques being used in phishing campaigns to avoid detection?
    • What phishing services are now being provided on the dark web, and what Office 365 credential “phishing kits” are being sold?
    • Are more mass-mailed phishing and targeted phishing campaigns reaching Office 365 users, and if so, by how much has each increased during the past 12 months?
  • Threats Over SSL: Why Inspecting HTTPS Traffic Is No Longer Optional
    Threats Over SSL: Why Inspecting HTTPS Traffic Is No Longer Optional
    Sigurdur Stefnisson, VP of Threat Research CYREN Recorded: Oct 22 2018 45 mins
    To maintain security, how critical is it really to inspect web traffic that is encrypted via SSL? Here we review global SSL traffic trends and share insights from analysis of traffic through Cyren’s global security cloud.

    Webinar participants will be presented with newly researched data and expert perspectives on several aspects of the SSL question, including:

    - Global tendencies in and drivers of encrypted web traffic
    - The prevalence of inspection of SSL traffic at companies today
    - A breakdown of the types of threats currently hiding in SSL-encrypted traffic
    - Some of the practical challenges associated with inspecting HTTPS traffic, and how such traffic inspection is best accomplished

Embed in website or blog