Hi [[ session.user.profile.firstName ]]

Email Security WTF?!: Why your email is still being compromised, and what to do

Email is the most commonly targeted attack vector. While many solutions have been introduced over the years, the invention of new evasion techniques means companies are still highly exposed. A new approach is urgently needed in order to ensure this channel is fully fortified for today and the future.

Join our CEO and CTO to learn more about:

1. How hackers are now easily bypassing traditional solutions like AVs, sandboxes, and more

2. How moving email to the cloud is an opportunity for much stronger, more efficient security

3. How to finally end the cat-and-mouse game with attackers with future-ready prevention techniques
Recorded Jun 26 2018 50 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Yoram Salinger: CEO - Perception Point, Shlomi Levin: Co-founder & CTO - Perception Point
Presentation preview: Email Security WTF?!: Why your email is still being compromised, and what to do

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Malware is a red herring. The real enemy is its source. Recorded: Sep 5 2018 64 mins
    Shlomi Levin: Founder & CTO - Perception Point; Michael Aminov: Founder & Chief Architect - Perception Point
    Malware is growing exponentially. Leaping +88% to 670 MM new variants in 2017 alone,
    the time, money and resources required to stay on top of this is unsustainable. It's time to stop
    fighting an un-winnable battle and focus on the real enemy, the source of malware - the exploit.
    Learn how by targeting the ~10 known exploit techniques, you can make chasing malware a
    thing of the past.

    Join our CTO and Cheif Architect to learn more about:

    1. What is an exploit technique and why you should care about it

    2. The different techniques attackers utilize to evade current solutions

    3. How to achieve visibility at the exploit-stage of the kill chain
  • Creative Hackers - the latest 'tricky' attack trends to watch for; ft James Rutt Recorded: Aug 8 2018 61 mins
    Michael Aminov: Founder & Chief Architect - Perception Point; James Rutt: CIO & CISO - Dana Foundation
    Attackers never rest. They are always inventing new ways to sneak by the current generation of security solutions. We are processing hundreds of thousands of files and URLs "in the wild" - and a significant number deemed "clean" by the leading engines on VirusTotal are actually malicious content generated by creative hackers.

    Learn about some of the latest techniques to watch out for in our monthly Creative Hackers program.

    In this session, join us and our guest, James Rutt, CIO & CISO of The Dana Foundation, to hear about a recent barrage his company received and more...

    Among the topics we will cover:

    1. The latest creative hacking themes and their means of execution

    2. Real life example of an attack escalation at the Dana Foundation

    3. How you can ensure your systems are more resilient against common tricks
  • A new security nightmare: How drives, messaging, etc. are a risk we can’t ignore Recorded: Jul 18 2018 49 mins
    Yoram Salinger: CEO - Perception Point, Michael Aminov: Founder & Chief Architect - Perception Point
    Wide adoption of new cloud collaboration apps (e.g. OneDrive, Slack, etc.) is creating many new security blindspots that are ripe for hackers to leverage. As more and more companies use these tools to communicate with customers, suppliers, and partners, and insider threats remain a challenge, IT decision makers should adapt and plan how to protect their organization from these new attack vectors.

    Join our CEO and Chief Architect to learn more about:

    1. How these tools are being adopted across the enterprise

    2. What are the specific security risks they pose

    3. How you can effectively manage this new level of complexity, and close the gaps
  • Email Security WTF?!: Why your email is still being compromised, and what to do Recorded: Jun 26 2018 50 mins
    Yoram Salinger: CEO - Perception Point, Shlomi Levin: Co-founder & CTO - Perception Point
    Email is the most commonly targeted attack vector. While many solutions have been introduced over the years, the invention of new evasion techniques means companies are still highly exposed. A new approach is urgently needed in order to ensure this channel is fully fortified for today and the future.

    Join our CEO and CTO to learn more about:

    1. How hackers are now easily bypassing traditional solutions like AVs, sandboxes, and more

    2. How moving email to the cloud is an opportunity for much stronger, more efficient security

    3. How to finally end the cat-and-mouse game with attackers with future-ready prevention techniques
Next Generation Cybersecurity
Perception Point - Advanced collaboration security designed for the modern enterprise.

Perception Point is a next-gen Israeli cybersecurity company leading advanced threat prevention across enterprise collaboration channels.

We've built-in multiple scanning engines and comprehensive threat intelligence for enhanced protection against both advanced threats and known attacks (e.g. phishing and commodity malware). We’ve invented the first technology to combine hardware visibility with software agility to see what leading solutions miss. Our propriety software algorithms x-ray code at CPU-level to intercept advanced attacks at the earliest stage possible —the exploit—before malware is delivered. No sandbox required.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Email Security WTF?!: Why your email is still being compromised, and what to do
  • Live at: Jun 26 2018 3:00 pm
  • Presented by: Yoram Salinger: CEO - Perception Point, Shlomi Levin: Co-founder & CTO - Perception Point
  • From:
Your email has been sent.
or close