Hi [[ session.user.profile.firstName ]]

Now is the time to revisit your email archiving needs

The introduction of the EU GDPR has forced mid-market and smaller enterprises to re-think their data governance processes. Many now recognise the benefits of following similar best practices to those adopted by larger enterprises. Others have seen a significant increase in subject access requests and are struggling to locate information in a timely manner to meet the new response deadline.

The result is that organisations of all sizes are showing renewed interest in email archiving. However, the options available can be confusing – from the native archiving built into your email service, like Office 365 or G-Suite, to an enterprise scale archive for all data and content types.

What You Will Learn
Participants in the webinar will come away with insight into:

- Trends in email archiving
- Email archiving options – what to look for in a product
- The importance of email security in your decision making process
- The functionality you need to satisfy the requirements of all your stakeholders
Recorded Oct 11 2018 33 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Duncan Mills - Product Marketing Director Cyren
Presentation preview: Now is the time to revisit your email archiving needs

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Defeat Phishing with Inbox Detection & Response Jan 30 2020 6:00 pm UTC 60 mins
    Pete Starr, Global Director of Sales Engineering at Cyren
    Phishing is evading email defences and reaching users’ inboxes. If your email security gateway later discovers a threat it has delivered, it is too late. Inbox Detection & Response (IDR), referred to in a recent paper by Gartner as Cloud Email Security Supplements is a new way of thinking about email security. It deploys directly into the inbox where it can continuously monitor emails and when a new threat is discovered it can automate response and remediation across every mailbox.
    Join security industry veteran, Pete Starr, to learn how IDR:
    • Creates an email defence-in-depth architecture to protect from evasive phishing attacks
    • Engages users at the point of risk by providing simple threat indicators and on-request scans
    • Automates response and remediation with M-SOAR, to remove the burden on your security analysts

    Want to find out more before registering? Read the IDR Vision Paper.
    [https://pages.cyren.com/rs/944-PGO-076/images/Inbox_Detection_and_Response_Vision.pdf]
  • Solve Phishing with Inbox Detection & Response Jan 30 2020 10:30 am UTC 60 mins
    Pete Starr, Global Director of Sales Engineering at Cyren
    Phishing is evading email defences and reaching users’ inboxes. If your email security gateway later discovers a threat it has delivered, it is too late. Inbox Detection & Response (IDR), referred to in a recent paper by Gartner as Cloud Email Security Supplements is a new way of thinking about email security. It deploys directly into the inbox where it can continuously monitor emails and when a new threat is discovered it can automate response and remediation across every mailbox.
    Join security industry veteran, Pete Starr, to learn how IDR:
    • Creates an email defence-in-depth architecture to protect from evasive phishing attacks
    • Engages users at the point of risk by providing simple threat indicators and on-request scans
    • Automates response and remediation with M-SOAR, to remove the burden on your security analysts

    Want to find out more before registering? Read the IDR Vision Paper

    [https://pages.cyren.com/rs/944-PGO-076/images/Inbox_Detection_and_Response_Vision.pdf]
  • Ausgeklügelte Attacken wie Emotet, Ryuk &Trickbot abwehren Recorded: Nov 26 2019 53 mins
    Marcel Leitel, Sales Engineer DACH Cyren
    Die Flut an Cyberattacken ist im vergangenen Jahr deutlich angestiegen und werden in 2019 immer intelligenter und raffinierter. Attacken wie Emotet und TrickBot machten in den letzten Monaten einen großen Anteil der Phishing-Angriffe aus. Die Eindringlinge haben es nicht nur auf die IT-Spezialisten in Unternehmen, sondern auch auf Ihre Mitarbeiter abgesehen. Unternehmen begegnen dieser Herausforderung häufig mit einer Vielzahl von Sicherheitslösungen nach dem Best-of-Breed-Ansatz. Ein aufwendiges Management, mangelnde Integration und nicht erkannte Sicherheitslücken sind die Folge. Bei dem Webinar wird Marcel Leitel Ihnen einen besseren Weg zu einem umfassenden, Cloudbasierten und proaktiven Schutz vor Cybergefahren zeigen.
  • Selecting and Integrating Real-Time Cloud Threat Intelligence Recorded: Nov 21 2019 47 mins
    Dr Richard Ford, Chief Technology Officer, Cyren
    “Better late than never” doesn’t apply to internet security, which has to be as fast as emerging threats in order to provide meaningful protection. If you are a security integrator or service provider looking for ways to improve the detection and “time-to-protection” of your products and services, in this webinar Cyren CTO Richard Ford will describe what to look for in cloud-based threat intelligence and file integrity checks in order to stop today’s evasive malware, and explain how Cyren approaches up-to-the-moment classification of malware threats through its Cloud Threat Lookup API and Cloud Sandbox Array.
  • Exploring Trends in Cloud Security in 2020 Recorded: Nov 7 2019 44 mins
    Jeremy Snyder, DivvyCloud | Lior Kohavi, Cyren | Chris DeRamus, DivvyCloud | Badri Raghunathan, Qualys
    As cloud technology continues to evolve, CISOs are adapting their strategies to keep up with today's threats. Cloud misconfigurations, business email compromise, and breaches taking months to detect are some of the key areas to focus on this year and next.

    Join this keynote panel of experts live alongside Microsoft Ignite to learn about the biggest trends in cloud security, the cyber threats to address today, and how organizations are preparing for 2020:

    - Threats on the horizon
    - Rise in phishing and cloud-based email attacks
    - Best practices for email and data protection
    - Practical risk management and compliance for the cloud
    - CISO strategy recommendations
    - The 2020 forecast

    Speakers:
    Jeremy Snyder, VP Business Development & International Strategy, DivvyCloud (Moderator)
    Lior Kohavi, Chief Strategy Officer & EVP Advanced Solutions, Cyren
    Chris DeRamus, CTO & Co-Founder, DivvyCloud
  • Ask the Expert: Moving Security to the Cloud Recorded: Nov 7 2019 25 mins
    Lior Kohavi, Cyren & Marianna Rossell, BrightTALK
    Join this live session with Cyren’s Chief Strategy Officer, Lior Kohavi, where we discuss moving security to the cloud.

    From strategies to overcome phishing, to improving protection at the perimeter before risks become threats, this is your chance to ask Lior any critical questions you have about security in and of the cloud.

    Speakers:
    Lior Kohavi, Chief Strategy Officer, Cyren
    Marianna Rossell, Enterprise Applications Events Manager, BrightTALK
  • How Do You Know Your Email Security Is Working? Recorded: Oct 17 2019 60 mins
    Tom McNash, Senior Solutions Engineer, Cyren & Duncan Mills, Product Marketing Director, Cyren
    Whether you use Office 365 or an on-premises gateway, have you been able to quantify how much malware, phishing and spam is evading your email security and getting through to your users? Cyren has developed an Email Security Gap Analysis test to measure how well a company’s in-place security is performing, and has just published a new, updated report with aggregated data on results from assessments done in 2019.
    This webinar reviews the key statistics and general findings in that report, as well as case studies and segmented industry data, example emails and threats uncovered during assessments (appropriately anonymized), and it covers how to complete your own assessment. Webinar registrants will receive a complimentary copy of the report.
  • Powering and Securing the Digital Enterprise Recorded: Oct 9 2019 44 mins
    Simon Ratcliffe, Ensono | Hugo Harber, Vodafone | Dr Richard Ford, Cyren | Imran Idrees, Cisco Meraki
    Join this live panel discussion with experts at Digital Transformation Expo Europe for a deep dive into best practices for powering and securing today's digital enterprise.

    Tune into this interactive Q&A session with world Security, Cloud and Business leaders while they discuss the following:

    - What it means to become a digital enterprise and notes from the field
    - How to develop a successful digital strategy, including moving your enterprise to containers, backup and recovery, storage and more
    - The key role of security and data protection when it comes to digital transformation

    This live panel will be streamed directly from the ExCeL London! Join us for live Q&A from the comfort of your desk.

    Panelists include:
    Hugo Harber, Head of Enterprise Portfolio, Vodafone
    Dr Richard Ford, CTO, Cyren
    Imran Idrees, Marketing Manager, Cisco Meraki

    Moderated by:
    Simon Ratcliffe, Technology Evangelist, Ensono
  • What Are You Doing About Office 365 Phishing Security? Recorded: Sep 30 2019 50 mins
    Michael Osterman, Principal Analyst, Osterman Research
    This webinar will present insights from a new, in-depth survey of IT and security professionals at large enterprises that use Office 365 for their corporate email. Covering organizations in both the US and UK, the webinar and survey report (a copy of which will be provided to all webinar participants) will give IT and security professionals, from CISOs to email admins, the opportunity to benchmark their own Office 365 security posture and planning with answers from their peers.

    Michael Osterman will cover views expressed on issues like security performance, the most prevalent models for SOCs, SIEM integration, how the migration to Office 365 was managed, types of additional security they’ve deployed, time spent remediating breaches, security budget growth, and how users report suspicious emails, along with expectations on new defensive technologies and services.
  • How Evasive Phishing Is Fooling Your Security Recorded: Sep 26 2019 36 mins
    Tinna Sigurdardottir, Threat Analyst; Duncan Mills, Director of Product Marketing
    Join Cyren threat researcher Tinna Sigurdardottir and industry security product veteran Duncan Mills to learn the top categories of evasive phishing techniques being applied by phishing campaign developers today, and why the use of such techniques is on the upswing.
    This webinar will walk participants step-by-step through examples of email phishing attacks that leverage evasive techniques, and review how these techniques are being incorporated into phishing kits and phishing-as-a-service offerings being sold on both the dark net and the open web. Participants will come away with a perspective on how evasive phishing is evolving in a manner similar to the historic evolution of evasive malware.
  • Adding Third-party Capabilities to Office 365 Recorded: Sep 19 2019 31 mins
    Michael Osterman, Principal Analyst, Osterman Research
    Office 365 is an industry-leading email platform with a wide collection of capabilities and a diverse user base. To help IT and security managers tailor their Office 365 deployment to their own needs and understand possible feature or performance gaps in the areas of security, archiving, eDiscovery, encryption, and other key aspects of the platform, Osterman Research will shortly publish a report based on an extensive survey in July 2019 of organizations using Office 365, combined with additional technical analysis of Office 365’s features and functions. In this webinar, Michael Osterman will review the report’s data and conclusions and provide insights on when and where companies should consider third-party solutions for Office 365. A complimentary copy of the report will be provided to all webinar attendees.
  • How Evasive Phishing Is Fooling Your Security Recorded: Jul 25 2019 37 mins
    Tinna Sigurdardottir, Threat Analyst; Duncan Mills, Director of Product Marketing
    Join Cyren threat researcher Tinna Sigurdardottir and industry security product veteran Duncan Mills to learn the top categories of evasive phishing techniques being applied by phishing campaign developers today, and why the use of such techniques is on the upswing.
    This webinar will walk participants step-by-step through examples of email phishing attacks that leverage evasive techniques, and review how these techniques are being incorporated into phishing kits and phishing-as-a-service offerings being sold on both the dark net and the open web. Participants will come away with a perspective on how evasive phishing is evolving in a manner similar to the historic evolution of evasive malware.
  • Cyren CSO Discusses the Future of Email Security at Infosecurity Europe 2019 Recorded: Jul 1 2019 8 mins
    Lior Kohavi, Chief Strategy Officer, Cyren & Paige Bidgood, BrightTALK
    Paige Bidgood from BrightTalk interviews Lior Kohavi, Cyren’s Chief Strategy Officer, about Cyren’s participation at Infosecurity Europe 2019, the future of email security, and how we use our cloud to protect enterprise customers.
  • What Are You Doing About Office 365 Phishing Security? Recorded: Jun 27 2019 51 mins
    Michael Osterman, Principal Analyst, Osterman Research
    This webinar will present insights from a new, in-depth survey of IT and security professionals at large enterprises that use Office 365 for their corporate email. Covering organizations in both the US and UK, the webinar and survey report (a copy of which will be provided to all webinar participants) will give IT and security professionals, from CISOs to email admins, the opportunity to benchmark their own Office 365 security posture and planning with answers from their peers.

    Michael Osterman will cover views expressed on issues like security performance, the most prevalent models for SOCs, SIEM integration, how the migration to Office 365 was managed, types of additional security they’ve deployed, time spent remediating breaches, security budget growth, and how users report suspicious emails, along with expectations on new defensive technologies and services.
  • Phishing kits: democratizing evasive phishing Recorded: Jun 13 2019 5 mins
    Duncan Mills
    Five minute summary recording of Cyren's Infosecurity Europe booth presentation explaining how phishing kits are making phishing campaigns available to even the most non-technical of cyber criminals.
  • Evasive phishing: insight into tactics Recorded: Jun 13 2019 5 mins
    Duncan Mills
    Five minute summary recording of Cyren's Infosecurity Europe booth presentation on evasive phishing tactics.
  • Evasive malware: insight into tactics & defences Recorded: Jun 13 2019 6 mins
    Duncan Mills
    Five minute summary recording of Cyren's Infosecurity Europe booth presentation on evasive malware tactics and defenses.
  • Why You Need Third-Party Solutions for Office 365 Recorded: Jun 6 2019 49 mins
    Michael Osterman, Principal Analyst, Osterman Research
    Office 365 is a capable and robust platform with a wide collection of features and functions. Like any large platform with diverse capabilities and a diverse user base, customers must analyze if it provides the depth of capability or specialized functionality they require in areas like security, archiving, authentication, eDiscovery, encryption, and file sharing.

    To help IT and security managers identify such features or performance gaps, Osterman Research has just published “Why Your Company Needs Third-Party Solutions for Office 365.”

    Join Michael Osterman, Principal Analyst, Osterman Research will review the results contained in the report of detailed research into Office 365’s functionality across several areas.

    Takeaways will include:
    • How prevalent it is for IT organizations using Office 365 today to contract additional security, archiving or other capabilities
    • Limitations in the embedded security included in standard Office 365 packages
    • Considerations in evaluating Microsoft’s Advanced Threat Protection module
    • What is needed to make Office 365’s eDiscovery capabilities really work for you
    • What particular issues must be understood by companies with hybrid environments

    *A complimentary copy of the report will be provided to all webinar attendees.
  • Top 5 Office 365 Phishing Kits to Watch For Recorded: Jun 4 2019 50 mins
    Magni Sigurdsson - Senior Threat Researcher, Cyren
    Have you noticed an uptick in phishing traffic reaching your company’s users? Been impressed by the sophistication of so many phishing sites? Phishing has become an industry, with new services and sophisticated turn-key “phishing kits” allowing nearly anyone to develop sophisticated attacks.

    Join Magni Sigurdsson, Senior Threat Researcher, Cyren as he shares the latest findings on phishing kits, including which brands are the most targeted, the five most-used phishing kits, showing actual examples, reviewing the mechanics of how they work and explaining how both users and security systems can recognize them.

    Takeaways will include:
    • The key phishing trends to look out for in 2019
    • The top phishing kits today in terms of “market share” that users are likely to encounter
    • Techniques that are being applied to phishing web sites and phishing campaigns
    • How users can identify the most sophisticated phishing web sites
  • Gap Analysis Measures the Effectiveness of Your Email Security Recorded: May 23 2019 48 mins
    Stuart Grierson, Lead Senior Solutions Engineer and Duncan Mills, Product Marketing Director
    Whether you use Office 365, a cloud email security service or an on-premises gateway, you should periodically test its effectiveness. This will allow you to quantify how much malware, phishing and spam is evading your email security and getting through to your users.
    Cyren has developed an Email Security Gap Analysis assessment to measure how well a company’s in-place security is performing. Aggregated data on results from assessments done in 2018 have been published and this webinar will review findings in that report, including:
    • Key statistics
    • Case studies and segmented industry data
    • Example emails and threats uncovered during assessments (appropriately anonymized)
    You will also find out how to have your own gap analysis done free of charge.
Cyren Webinars
More than 1.3 billion users around the world rely on Cyren’s 100% cloud internet security solutions to protect them against cyber attacks and data loss every day. Powered by the world’s largest security cloud, Cyren delivers fast time to protection from cyber threats with award-winning Security as a Service for email, sandboxing, and DNS for enterprises, and embedded threat intelligence solutions for security vendors and service providers. Customers like Google, Microsoft and Check Point are just a few of the businesses that depend on Cyren every day to power their security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Now is the time to revisit your email archiving needs
  • Live at: Oct 11 2018 1:30 pm
  • Presented by: Duncan Mills - Product Marketing Director Cyren
  • From:
Your email has been sent.
or close