Hi [[ session.user.profile.firstName ]]

Now is the time to revisit your email archiving needs

The introduction of the EU GDPR has forced mid-market and smaller enterprises to re-think their data governance processes. Many now recognise the benefits of following similar best practices to those adopted by larger enterprises. Others have seen a significant increase in subject access requests and are struggling to locate information in a timely manner to meet the new response deadline.

The result is that organisations of all sizes are showing renewed interest in email archiving. However, the options available can be confusing – from the native archiving built into your email service, like Office 365 or G-Suite, to an enterprise scale archive for all data and content types.

What You Will Learn
Participants in the webinar will come away with insight into:

- Trends in email archiving
- Email archiving options – what to look for in a product
- The importance of email security in your decision making process
- The functionality you need to satisfy the requirements of all your stakeholders
Recorded Oct 11 2018 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Duncan Mills - Product Marketing Director Cyren
Presentation preview: Now is the time to revisit your email archiving needs

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Geschicktes Phishing zielt auf Office 365: Was Sie wissen sollten! Recorded: Dec 6 2018 56 mins
    Marcel Leitel, Sales Engineer DACH Cyren
    Ist Ihnen ein Anstieg an Phishing-Verkehr, der Ihre Mitarbeitern erreicht, aufgefallen? Phishing ist eine Industrie geworden, mit neuen Methoden und neuen „Dark Web“-Diensten, die immer schwerer zu erkennen sind und schon durch das bloße Volumen von Massen- und gezielten Phishings auffallen.

    In diesem Webinar wird Marcel Leitel, die neuen Phishing-Technologien erläutern wie auch Beispiele von auf Office-365 zielende Phishing-Kampagnen aufzeigen. Erfahren Sie, wie die heutige Phishing-Industrie funktioniert und gleichen Sie diese Entwicklungen mit den Ergebnissen einer neuen Untersuchung zu Office-365 ab, die Office-365-Administratoren und IT-Manager bei der Auswahl der verschiedenen Sicherheitskonzepte unterstützt.

    Dieses Webinar bietet IT- und Sicherheits- Spezialisten die Möglichkeit, dass bei Office 365 eingesetzte Phishing Phänomen zu verstehen und das Wissen bei der Auswahl ihrer Firmen-Sicherheitsstrategie anzuwenden. Kernlernpunkte sind:

    - Welche Phishing Kampagnen zielen heute auf Office 365? Wie sehen diese aus und wie funktionieren sie?
    - Welche neuesten Techniken werden von Phishing-Kampagnen eingesetzt, um Erkennung zu verhindern?
    - Welche Phishing-Dienste werden im Dark Web angeboten und welche Office 365 ‚phishing kits‘ werden verkauft?
    - Erreichen mehr Massen-Phishings und gezielte Phishing-Kampagnen Office 365 Nutzer und wenn ja, um wie viel ist dies in den letzten 12 Monaten angestiegen?
  • Confronting the Ransomware Crisis: Best Practices for Securing Your Business Recorded: Dec 5 2018 44 mins
    Dan Maier, VP Marketing
    Ransomware such as CryptoLocker, CryptoWall and Locky are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defenses. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    View this on-demand webinar broadcast to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Evasive Phishing Targeting Office 365: What You Need to Know Recorded: Dec 3 2018 46 mins
    Magni Sigurdsson, Senior Threat Researcher, Cyren and Duncan Mills, Director of Product, Cyren
    About This Live Webinar
    Have you noticed an uptick in phishing traffic reaching your company’s users? Phishing has become an industry, with new methods appearing and new “dark web” services increasing the evasiveness and sheer volume of both mass and targeted phishing threats.

    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from real-world security performance assessments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.

    What You Will Learn:
    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from a recent survey of Office 365 deployments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.
    Takeaways will include:
    • What phishing campaigns are targeting Office 365 today, what do they look like, and how do they work?
    • What are the latest techniques being used in phishing campaigns to avoid detection?
    • What phishing services are now being provided on the dark web, and what Office 365 credential “phishing kits” are being sold?
    • Are more mass-mailed phishing and targeted phishing campaigns reaching Office 365 users, and if so, by how much has each increased during the past 12 months?
  • Phishing Security for Office 365 Recorded: Nov 29 2018 59 mins
    Michael Osterman, Principal Analyst, Osterman Research and Pete Starr, Senior Director of Solution Engineering, Cyren
    About this live webinar
    The Microsoft Office 365 platform currently blocks over 5 billion phishing messages a year. But as mass and targeted phishing attacks increase in volume, speed and evasiveness, is additional protection needed to secure Office 365 email for your organization?

    To answer this question, Osterman Research’s principal analyst will share insights from a recent study of Office 365 deployments, and Cyren’s global director of solution engineering will walk through the phishing kill chain and point to practical opportunities to enhance defences.


    What you will learn

    This webinar provides IT and security professionals the opportunity to understand phishing security issues for Office 365 deployments. Takeaways will include:
    •What is the current experience of Office 365 deployments in terms of phishing security?
    •What are typical limitations for Office 365 deployments in dealing with today’s phishing threat landscape?
    •Considering how phishing attacks work, what countermeasures are available at each stage?
    •What are 10 steps organizations using Office 365 can take to stop phishing attacks?
  • Email Security: Why It Probably Isn’t Working, and What To Do Recorded: Nov 26 2018 48 mins
    Michael Osterman of Osterman Research
    Why is email security back on everybody’s agenda?
    Why do email security solutions seem to be improving only slightly in certain areas, and getting worse in others? Or is that not true?
    In the midst of the current phishing and ransomware epidemic, security must get better – but how?

    View this on-demand webinar to hear Michael Osterman of Osterman Research share the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.
  • Best Practices to Combat Ransomware: Petya, WannaCry and Future Attacks Recorded: Nov 16 2018 44 mins
    Dan Maier, VP of Marketing at Cyren
    Ransomware such as Petya and WannaCry are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defences. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    Download this webinar to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Is It Time to Move Your Security to the Cloud? Recorded: Nov 13 2018 39 mins
    Dan Maier, VP of Marketing at Cyren
    Despite spending an estimated $85B on security in 2016, the volume of malicious attacks has grown dramatically, billions of records have been stolen, and data breaches are at an all-time high.

    The traditional choice for internet security used to be appliances deployed at the network perimeter, but the world has changed, and this model is not working as well as it used to.

    View this on-demand webinar to learn about the challenges that a cloud first, mobile first world poses for legacy security appliances, and the benefits that a cloud-based approach to security can deliver.
  • Email Security Gap Analysis: How Do You Know Your Security Is Working? Recorded: Nov 8 2018 43 mins
    Tom McNash, Senior Solution Engineer
    A decade ago, email threats were well understood and reasonably under control, leading email security to become “commoditized” and vendors to diversify into other services, losing focus on security. This lack of investment and innovation in email security is evident in the success of modern threats like ransomware and phishing, and begs the question ‘How much malware, phishing and spam is really getting through to my users?’

    Cyren has developed a free Email Security Gap Analysis test in order to measure how well a company’s in-place security is performing relative to detection by Cyren’s global security cloud, and recently published a report with aggregated data on results from assessments done in September and October. The webinar will cover a discussion of the findings in that report, additional insights and threat examples uncovered during assessments (appropriately anonymized), and how to have your own gap analysis done.

    Participants in the webinar will come away with a sense of:

    - How much spam, malware and phishing are current email security systems missing?
    - What was the range of results for different assessment participants, considering different case studies?
    - What factors drive higher or lower “miss” rates for malicious emails, even for systems provided by the same security vendor?
    - What might be an expectation for my own company’s security?
    - How is an email gap analysis conducted?
    - What is involved in terms of configuration and are there any impacts to current email operations?
    - How can I arrange to run an Email Security Gap Analysis for my own company?
    - What are the eligibility requirements?
  • Evasive Phishing Targeting Office 365: What You Need to Know Recorded: Oct 25 2018 46 mins
    Magni Sigurdsson, Senior Threat Researcher, Cyren and Duncan Mills, Director of Product, Cyren
    About This Live Webinar
    Have you noticed an uptick in phishing traffic reaching your company’s users? Phishing has become an industry, with new methods appearing and new “dark web” services increasing the evasiveness and sheer volume of both mass and targeted phishing threats.

    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from real-world security performance assessments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.

    What You Will Learn:
    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from a recent survey of Office 365 deployments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.
    Takeaways will include:
    • What phishing campaigns are targeting Office 365 today, what do they look like, and how do they work?
    • What are the latest techniques being used in phishing campaigns to avoid detection?
    • What phishing services are now being provided on the dark web, and what Office 365 credential “phishing kits” are being sold?
    • Are more mass-mailed phishing and targeted phishing campaigns reaching Office 365 users, and if so, by how much has each increased during the past 12 months?
  • Threats Over SSL: Why Inspecting HTTPS Traffic Is No Longer Optional Recorded: Oct 22 2018 45 mins
    Sigurdur Stefnisson, VP of Threat Research CYREN
    To maintain security, how critical is it really to inspect web traffic that is encrypted via SSL? Here we review global SSL traffic trends and share insights from analysis of traffic through Cyren’s global security cloud.

    Webinar participants will be presented with newly researched data and expert perspectives on several aspects of the SSL question, including:

    - Global tendencies in and drivers of encrypted web traffic
    - The prevalence of inspection of SSL traffic at companies today
    - A breakdown of the types of threats currently hiding in SSL-encrypted traffic
    - Some of the practical challenges associated with inspecting HTTPS traffic, and how such traffic inspection is best accomplished
  • The Downsides and Dangers of Cryptocurrency Mining Recorded: Oct 19 2018 48 mins
    Magni Sigurdsson, Senior Threat Researcher, CYREN
    Browser-based mining for cryptocurrency is up 725% globally since the debut of Coinhive. The rapid spread of "cryptojacking" is grabbing headlines and driving discussion about this new "business model" for websites, but the problems and risks posed by cryptomining run deeper than just non-consensual use of a small bit of CPU power.

    What You Will Learn
    - The different types of cryptominers and why they are an issue for IT security
    - The top 5 security risks and downsides associated with cryptomining
    - How cryptomining scripts and malware is being distributed
    - The recent history of cryptomining and likely future trends
    - Best practices from a security perspective with respect to cryptocurrency mining
  • Is Your Web Security Working? How to Test and Tune Your Web Security Recorded: Oct 16 2018 40 mins
    John DiTroia, Chief Architect of the Web Security Diagnostic
    Cyren’s Web Security Diagnostic, which in less than 30 seconds tests vulnerability to a series of threats like basic and advanced viruses, phishing URLs, botnet calls, and malware hidden in HTTPS traffic has been run by thousands of IT and security professionals and their users to assess the performance of their web gateway security. Test your web security today.
  • Now is the time to revisit your email archiving needs Recorded: Oct 11 2018 33 mins
    Duncan Mills - Product Marketing Director Cyren
    The introduction of the EU GDPR has forced mid-market and smaller enterprises to re-think their data governance processes. Many now recognise the benefits of following similar best practices to those adopted by larger enterprises. Others have seen a significant increase in subject access requests and are struggling to locate information in a timely manner to meet the new response deadline.

    The result is that organisations of all sizes are showing renewed interest in email archiving. However, the options available can be confusing – from the native archiving built into your email service, like Office 365 or G-Suite, to an enterprise scale archive for all data and content types.

    What You Will Learn
    Participants in the webinar will come away with insight into:

    - Trends in email archiving
    - Email archiving options – what to look for in a product
    - The importance of email security in your decision making process
    - The functionality you need to satisfy the requirements of all your stakeholders
  • “Fileless” Ransomware: The Next Big Thing? Recorded: Oct 8 2018 45 mins
    Arna Magnusardottir - Senior Malware Researcher
    This webinar presentation by Arna Magnusardottir, Senior Malware Researcher at Cyren, will provide an end-to-end look at fileless ransomware attacks and show how they fit into the current ransomware landscape. Using real-world examples, she will cover the range of techniques in use, common attack vectors, and strategies for defense for IT and security managers.
  • Email Security Gap Analysis: How Do You Know Your Security Is Working? Recorded: Oct 5 2018 43 mins
    Tom McNash, Senior Solution Engineer
    A decade ago, email threats were well understood and reasonably under control, leading email security to become “commoditized” and vendors to diversify into other services, losing focus on security. This lack of investment and innovation in email security is evident in the success of modern threats like ransomware and phishing, and begs the question ‘How much malware, phishing and spam is really getting through to my users?’

    Cyren has developed a free Email Security Gap Analysis test in order to measure how well a company’s in-place security is performing relative to detection by Cyren’s global security cloud, and recently published a report with aggregated data on results from assessments done in September and October. The webinar will cover a discussion of the findings in that report, additional insights and threat examples uncovered during assessments (appropriately anonymized), and how to have your own gap analysis done.

    Participants in the webinar will come away with a sense of:

    - How much spam, malware and phishing are current email security systems missing?
    - What was the range of results for different assessment participants, considering different case studies?
    - What factors drive higher or lower “miss” rates for malicious emails, even for systems provided by the same security vendor?
    - What might be an expectation for my own company’s security?
    - How is an email gap analysis conducted?
    - What is involved in terms of configuration and are there any impacts to current email operations?
    - How can I arrange to run an Email Security Gap Analysis for my own company?
    - What are the eligibility requirements?
  • Live Panel - Powering and Securing the Digital Enterprise Recorded: Oct 3 2018 41 mins
    Simon Ratcliffe | Ben Carmi | Adrian Louth | Jonathan Zulberg | Andrew Scott
    Join this live panel discussion with experts at IP Expo Europe 2018 for a deep dive into best practices for powering and securing today's digital enterprise.

    Tune into this interactive Q&A session with world renowned IT, Security, and Business leaders while they discuss the following:

    - What it means to become a digital enterprise and notes from the field
    - How to develop a successful digital strategy, including moving your enterprise to containers, backup and reovery, storage and more
    - The key role of security and data protection when it comes to digital transformation

    This live panel will be streamed directly from IP Expo Europe at Excel London! Join us for live Q&A from the comfort of your desk.

    Simon Ratcliffe (CIO Advisor & Mentor, Ensono & Cloud Industry Forum & Moderator)
    Ben Carmi, Senior Vice President Product Management, Cyren
    Adrian Louth, Enhanced Technology Specialist, Fortinet
    Jonathan Zulberg, Senior Sales Engineer, LogRhythm
    Andrew Scott, Systems Engineering Manager, UK & Ireland Citrix
  • Confronting the Ransomware Crisis: Best Practices for Securing Your Business Recorded: Sep 24 2018 44 mins
    Dan Maier, VP Marketing
    Ransomware such as CryptoLocker, CryptoWall and Locky are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defenses. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    View this on-demand webinar broadcast to learn how ransomware attacks happen and what you can do to protect your business from them.
  • Email Security: Why It Probably Isn’t Working, and What To Do Recorded: Sep 24 2018 48 mins
    Michael Osterman of Osterman Research
    Why is email security back on everybody’s agenda?
    Why do email security solutions seem to be improving only slightly in certain areas, and getting worse in others? Or is that not true?
    In the midst of the current phishing and ransomware epidemic, security must get better – but how?

    View this on-demand webinar to hear Michael Osterman of Osterman Research share the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.
  • Reducing the Risk of Phishing Attacks Recorded: Sep 18 2018 43 mins
    Derek Brink, Aberdeen
    Within the first 24 hours of a phishing attack, attackers hook virtually 100% of their victims. And these attacks are only growing more sophisticated and dangerous. To truly protect your business, you have to get in front of phishing attacks and stop them in as little time as possible.

    In this invaluable webinar, Aberdeen’s Derek Brink reveals what the risks from phishing attacks to your business truly are, and the strategies the Best-in-Class use to reduce those risks as much as possible.

    What You Will Learn
    - What happens in the first 60 minutes of a phishing attack
    - Why relying on browser-based protection is not enough
    - Why an investment in advanced email and web security pays off
    - How the Best-in-Class invest in technology that operates faster than both users and attackers
  • Is Your Web Security Working? How to Test and Tune Your Web Security Recorded: Sep 7 2018 40 mins
    John DiTroia, Chief Architect of the Web Security Diagnostic
    Cyren’s Web Security Diagnostic, which in less than 30 seconds tests vulnerability to a series of threats like basic and advanced viruses, phishing URLs, botnet calls, and malware hidden in HTTPS traffic has been run by thousands of IT and security professionals and their users to assess the performance of their web gateway security. Test your web security today.
CYREN Webinars
More than 1.3 billion users around the world rely on Cyren’s 100% cloud internet security solutions to protect them against cyber attacks and data loss every day. Powered by the world’s largest security cloud, Cyren delivers fast time to protection from cyber threats with award-winning Security as a Service for web, email, sandboxing, and DNS for enterprises, and embedded threat intelligence solutions for security vendors and service providers. Customers like Google, Microsoft and Check Point are just a few of the businesses that depend on Cyren every day to power their security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Now is the time to revisit your email archiving needs
  • Live at: Oct 11 2018 1:30 pm
  • Presented by: Duncan Mills - Product Marketing Director Cyren
  • From:
Your email has been sent.
or close