Hi [[ session.user.profile.firstName ]]

How a CISO Disruptor Stops Phishing Fire Drills

Mike Britton of $7.7B leader, Alliance Data, shares a game-changing cybersecurity solution.

Mike was seeing an increase in the frequency and sophistication of phishing emails hitting his organization’s Office 365 inboxes. C-levels were worried. SOC brush fires kept breaking out.

To reduce risk and stop the fire drills, he launched an anti-phishing project. Join this live webinar and hear Mike discuss his priorities, approach and results. He’ll be joined by Area 1 Security CEO Oren Falkowitz to discuss how pay-for-performance solutions can close the cybersecurity gap.
Recorded Jun 27 2019 29 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Michael Britton, Oren Falkowitz
Presentation preview: How a CISO Disruptor Stops Phishing Fire Drills

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Phishing and the MITRE ATT&CK Framework Recorded: Oct 21 2020 32 mins
    Oren J. Falkowitz and Kevin Wilson
    Aligning your cybersecurity approach to frameworks like MITRE ATT&CK can be an effective tool, applicable to any industry. And while phishing is just one adversary tactic mentioned in “initial access”, MITRE ATT&CK can guide a comprehensive email security strategy — to ensure that you effectively stop malware, ransomware, credential theft, Types 1-4 BECs and other advanced threats.
  • Deliver Best-of-Breed Cloud Email Security 
& Encryption Recorded: Sep 9 2020 45 mins
    Rob McDonald, Paul East
    The increase of sensitive data stored and shared via email, combined with the growing prevalence of phishing attacks exacerbate cybersecurity risks. Phishing is the root cause of 95% of breaches, while poor visibility and control of cloud email create data governance challenges for 90% of organizations. Traditional approaches come up short, missing phishing campaigns and preventing organizations from controlling and monitoring email once it’s shared.

    Virtru and Area 1 Security deliver seamless, end-to-end encryption and advanced cloud email security for maximum security ROI, protecting organizations from phishing attacks while keeping email contents protected everywhere they’re shared.
    What You’ll Learn:

    Key trends related to the evolving email threat landscape and how traditional email security approaches fail to address emerging challenges, putting organizations at risk of data breaches, privacy violations, and noncompliance penalties.

    Virtru and Area 1’s best-of-breed joint solution for encryption and cloud email security that helps organizations strengthen their security posture.

    How Area 1 proactively hunts and intercepts sophisticated phishing campaigns like Business Email Compromise, which look innocuous to cloud email suites — all while reducing time spent on phishing investigations by up to 90%.

    How Virtru’s end-to-end encryption, persistent control, and granular audit protect email everywhere it’s shared to keep email and attachments private and compliant.
  • Microsoft Office 365, Compromised Recorded: Sep 2 2020 64 mins
    Dom Yip, Kevin Wilson
    So far this year, Area 1 has intercepted $273 MILLION+ in active Business Email Compromise — phishing attempts that were missed by Office 365, email gateways and other traditional defenses.

    Even with ATP, if you’re missing a purpose-built, cloud-native email security layer, your Office 365 users are at risk for Business Email Compromise phishing and other advanced threats.

    Join Area 1’s Sr. Product Manager and former CISO of Guess? Inc, Kevin Wilson, along with Dominic Yip, Director of Sales Engineering, on Aug. 27th to understand:

    How bad actors evade Office 365’s ATP, email authentication and other security layers to successfully phish your users

    Recent examples of BEC and other phishing campaigns that bypassed Office 365 defenses, but were blocked by Area 1

    How to boost Office 365’s native security with six cloud-native techniques, such as campaign source analytics, conversational context analysis, partner social graphing and more

    Attendees will also receive a complimentary copy of Gartner’s 2020 “Protecting Against Business Email Compromise Phishing Attacks” report.
  • Bypass DMARC in 60 Minutes or Less Recorded: Jul 29 2020 34 mins
    Blake J. Darché, Javier Castro
    You’ve tuned your email security, and configured DMARC correctly, yet your employees are still getting phished. Why?

    Email authentication and sender reputation were designed to help brands deliver their email messages properly to inboxes; but they were not designed to help protect your organization from the most sophisticated phish. In fact, our co-founder/CSO, Blake Darché, and our principal security researcher, Javier Castro, will demonstrate through the creation of a real-time live attack, that even when you deploy DMARC for your domain:
    It’s easy it is to establish a new phishing domain that exploits trusted infrastructure
    It’s fast to set up DMARC, SPF and DKIM policies for new phishing domains in order to reach inboxes
    You need to detect phish beyond email authentication via comprehensive message analysis, computer vision, domain registration checks, and other techniques beyond email authentication.

    Attackers know the DMARC basics, and can easily exploit trusted infrastructure and new domains to compromise your trusted business partners or internal employee accounts to get phishing emails into your inbox.

    See how easy it is to set up a phishing campaign that evades email authentication and lands in your inbox - and what you should do, instead.
  • The Role of Cybersecurity in Times of Crisis Recorded: Jul 15 2020 61 mins
    Laurie Williams, Dominic Yip, Jep Linton, Laszlo Gonc, Kevin Wilson
    Pour an afternoon drink and join a virtual happy hour to discuss Cybersecurity’s crucial role in times of crisis. Jeb Linton, CTO of IBM’s Partner Ecosystem and Cognitive Security, Kevin Wilson, former Guess? Global Information Security Officer, and other security experts will discuss the persistent trends and attack types brought on by the COVID-19 pandemic that continue to plague IT infrastructure. How can cybersecurity professionals lead when it comes to balancing work culture disruptions, the economic downturn and realities of budget constraints — all while bad actors continue to ramp up their efforts to infiltrate organizations?
  • 5 Ways to Improve Office 365 Email Security Recorded: Jul 1 2020 54 mins
    Dom Yip, Kevin Wilson
    Protecting Microsoft Office 365 from phishing attacks - the #1 cause of cyber breaches - presents a massive challenge. Your organization’s inboxes are prime phishing targets, and bad actors have already adapted their efforts to the cloud. Far from being a barrier, O365 is a tool for cybercriminals.
  • 7 CISOs You Meet in Hell... And How Not to Become the 8th Recorded: Jun 24 2020 48 mins
    Blake J. Darché, Shalabh Mohan, Kevin Wilson
    The “Seven CISOs You Meet in Hell” are the CISOs that fail to learn from history’s mistakes … who stay stuck in common cybersecurity pitfalls, instead of strengthening their cybersecurity posture.
  • How to Stop Financial Phishing Attacks Recorded: May 29 2020 63 mins
    Juliette Cash
    The Covid-19 era’s large remote workforce and tax-related phishing scams means all organizations are at significantly greater risk of damaging financial cybercrime. Yet, even tools like Office 365 with ATP, DMARC, DKIM and SPF fail to stop these phishing attacks.
  • Security Straight Shooters Recorded: May 13 2020 37 mins
    Jason Truppi, Omer Taran, Blake Darche, Troy Wilkinson, Kevin Wilson
    Effective Cybersecurity in the Days of COVID-19

    Pour yourself an afternoon drink and join an uninhibited panel discussion where experts will take your questions and try to ease your cybersecurity pain. We’ll focus on how leaders are managing people, process and technology through these challenging times, to keep their organizations secure.

    Our moderator and panel experts will share their unfiltered and provocative perspectives.

    So register now, share your questions, and our panelists will give you their take on the most challenging and controversial issues you’re facing these days.
  • How to Secure Remote Workers Now Recorded: Apr 22 2020 47 mins
    Juliette Cash
    Your people need the productivity that collaboration tools like Zoom, G Suite, Slack, MS Office, Teams and others give them. And you need to ensure that your newly-expanded remote workforce can’t be preyed on by hackers.

    How do you manage both, as phishing attacks that exploit employees’ fears about the novel coronavirus increase dramatically?

    In this webinar you’ll get insights from Area 1’s lead threat researcher on:

    - How more use of collaborative apps enables phishing and breaches
    - Specific techniques employed in sophisticated cyberattacks
    - How to block these attacks systematically

    You’ll hear about other Fortune 500 companies’ experiences and strategies you can apply to your own business.
  • Business Partners, Compromised Recorded: Apr 7 2020 47 mins
    Shalabh Mohan
    Business Email Compromise attacks increased by nearly 100% in 2019 — and cost businesses over $1.7 billion in losses. Yet, according to a new Gartner report, traditional email inspection techniques are ineffective at detecting BEC phishing — least of all the new generation of BEC attacks.

    The new generation of BEC attacks exploits the weakest links in your digital chain: your trusted suppliers and business partners.
    Join the “Business Partner, Compromised” On Demand Webinar and learn:

    - How BEC phishing techniques have evolved over the past decade
    - The differences between stopping BEC phish from spoofed CEOs vs. infiltrated supply chains
    - How to uncover and close anti-BEC phishing gaps in your SEG, cloud email and DMARC defenses
    Why the remote workforce is particularly susceptible to BEC phishing in the COVID-19 era
  • How to Stop the COVID-19 Phishing Outbreak Recorded: Mar 19 2020 30 mins
    Juliette Cash
    SEG, Cloud Email Users Successfully Targeted by COVID-19 Phishing: What to Know Now

    Playing on growing fears of the novel coronavirus known as COVID-19, threat actors are deploying next-gen phishing attacks that successfully infiltrate Cloud inboxes, and get past SEGs and DMARC defenses.
  • How a CISO Disruptor Stops Phishing Fire Drills Recorded: Dec 5 2019 27 mins
    Oren Falkowitz, Mike Britton
    Mike Britton of $7.7B leader, Alliance Data, shares a game-changing cybersecurity solution.

    Mike was seeing an increase in the frequency and sophistication of phishing emails hitting his organization’s Office 365 inboxes. C-levels were worried. SOC brush fires kept breaking out.

    To reduce risk and stop the fire drills, he launched an anti-phishing project. Join this live webinar and hear Mike discuss his priorities, approach and results. He’ll be joined by Area 1 Security CEO Oren Falkowitz to discuss how pay-for-performance solutions can close the cybersecurity gap.
  • How AVX Stops Targeted Phishing Attacks and Reduces Global Cyber Risk Recorded: Oct 16 2019 27 mins
    Zack Moody, Global Head of Cybersecurity & Privacy at AVX and Carl Rogers, Solution Engineer at Area 1 Security
    With an ever-changing threat landscape, how can security leaders best prioritize projects to reduce cyber risk? Facing this challenge head-on, Zack Moody, GlobalHead of Cybersecurity & Privacy for AVX, a leading manufacturer of advanced electronic components, looked to solve for the threat at the root of 95% of damaging cyber breaches, phishing attacks. Register for this webinar and hear how AVX:

    - Blocks over 10,000 phishing attempts annually, reducing cybersecurity risk and IT fire drills.
    - Gets global insight into threats targeting the company.
    - Provides quarterly cyber security reporting to executives and the board, including the number and types of attacks blocked, and the ROI for anti-phishing security.
    - Maintains management confidence that cloud-based email is secure.
    - Integrates the most advanced anti-phishing controls
  • How a CISO Disruptor Stops Phishing Fire Drills Recorded: Jun 27 2019 29 mins
    Michael Britton, Oren Falkowitz
    Mike Britton of $7.7B leader, Alliance Data, shares a game-changing cybersecurity solution.

    Mike was seeing an increase in the frequency and sophistication of phishing emails hitting his organization’s Office 365 inboxes. C-levels were worried. SOC brush fires kept breaking out.

    To reduce risk and stop the fire drills, he launched an anti-phishing project. Join this live webinar and hear Mike discuss his priorities, approach and results. He’ll be joined by Area 1 Security CEO Oren Falkowitz to discuss how pay-for-performance solutions can close the cybersecurity gap.
  • Area 1 Security Phish of the Week Recorded: Oct 11 2018 12 mins
    Kel Jackson
    Area 1 Security dives deep into an interesting phish and how they caught it. This week on Oct 11 2018, Sr. PM Kel Jackson takes a look at a compromised address phish.
  • Security Awareness Training: Can Your People be Patched ? Recorded: Sep 24 2018 10 mins
    Jane Wasson, Area 1 Product Marketing
    Security awareness training is deployed by many organizations today for a variety of reasons including meeting regulatory requirements and reducing the risk of phishing breaches.

    But unfortunately, security awareness training alone doesn’t stop phishing.

    During today’s webinar, we’ll look at the role security awareness training plays in protecting from phishing and why analysts recommend that for best protection, organizations should combine anti-phishing technical controls and security training to defend from phishing attacks.
  • SIEM Security: Accelerate Phishing Detection and Incident Response Recorded: Aug 16 2018 11 mins
    Jane Wasson Area 1 Product Marketing
    The threat that most often breaches defenses is the phishing attack. One of the biggest challenges for security teams and is to quickly and effectively detect these attacks, and then efficiently investigate and respond to prevent damage.

    Watch this webinar and learn how customers that integrate Area 1’s pre-emptive anti-phishing service with a SIEM platform can:

    o Get deep insight and visibility into phish detected and blocked by the
    Area 1 service
    o Quickly and effectively uncover related advanced threat activity
    organization-wide
    o More efficiently investigate and respond to incidents
    o Provide visibility into threat actor behavior and trends
    o Facilitate and customize threat reporting
  • Phishing Attack Vectors | How to Fortify Your Defenses Recorded: Jun 18 2018 12 mins
    Jane Wasson | Product Marketing Manager | Area 1 Security
    If all of the email systems in the world shut down tomorrow, would phishing attacks stop?

    Nope.

    Why? The attack vectors hackers use to execute phishing campaigns aren’t limited to only email traffic. So defense strategies that focus on protecting just email will miss phishing activity on other attack vectors. For best protection, your security strategy needs a unified approach to protect you from phishing activity across all common attack vectors, including email, web, and network.

    Join this webinar and learn:

    o Attack vectors hackers exploit to execute phishing campaigns

    o How phish bypass security infrastructure

    o Strategies to fortify defenses and stop phishing attacks
  • Why Secure Email Gateways Miss Phishing Emails Recorded: Feb 26 2018 13 mins
    Jane Wasson
    Email remains the number one threat vector for data breaches. Secure email gateways (SEGs), the very resource we depend on to protect our email, actually miss phishing attacks with regularity. Why? Watch this webinar and learn exactly how phish evade them. Ideally, SEGs detect emails sent from malicious sites, prevent users from accessing deceptive URLs, pinpoint attachments with criminal code, and sandbox suspicious files. So with all this smart technology on alert—why do targeted phishing attacks slip through?

    Join this webinar to learn:

    Why phishing attacks evade secure email gateways

    The breakthrough that fortifies defenses and stops targeted phishing attacks

    Demonstrated effectiveness of preemptive phish-detection from Fortune 1000 businesses
Area 1 stops phishing—the #1 root cause of all data breaches
Area 1 Security stops phishing attacks preemptively and comprehensively across email, web, and network traffic. Phishing is the #1 cyberattack vector and over 95% of all breaches begin with a phishing attack—making phishing the cause of financial losses, data exfiltration and brand damage to organizations large and small.

By looking at phishing comprehensively and preemptively; and leveraging a cloud-native architecture, Area 1 Security has found great success in helping F500 customers secure their move to the cloud while supporting the needs of their global and mobile end-user base.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How a CISO Disruptor Stops Phishing Fire Drills
  • Live at: Jun 27 2019 6:00 pm
  • Presented by: Michael Britton, Oren Falkowitz
  • From:
Your email has been sent.
or close