Hi [[ session.user.profile.firstName ]]

Cyren CSO Discusses the Future of Email Security at Infosecurity Europe 2019

Paige Bidgood from BrightTalk interviews Lior Kohavi, Cyren’s Chief Strategy Officer, about Cyren’s participation at Infosecurity Europe 2019, the future of email security, and how we use our cloud to protect enterprise customers.
Recorded Jul 1 2019 8 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Lior Kohavi, Chief Strategy Officer, Cyren & Paige Bidgood, BrightTALK
Presentation preview: Cyren CSO Discusses the Future of Email Security at Infosecurity Europe 2019

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Adding Third-party Capabilities to Office 365 Sep 19 2019 2:00 pm UTC 60 mins
    Michael Osterman, Principal Analyst, Osterman Research
    Office 365 is an industry-leading email platform with a wide collection of capabilities and a diverse user base. To help IT and security managers tailor their Office 365 deployment to their own needs and understand possible feature or performance gaps in the areas of security, archiving, eDiscovery, encryption, and other key aspects of the platform, Osterman Research will shortly publish a report based on an extensive survey in July 2019 of organizations using Office 365, combined with additional technical analysis of Office 365’s features and functions. In this webinar, Michael Osterman will review the report’s data and conclusions and provide insights on when and where companies should consider third-party solutions for Office 365. A complimentary copy of the report will be provided to all webinar attendees.
  • How Evasive Phishing Is Fooling Your Security Recorded: Jul 25 2019 37 mins
    Tinna Sigurdardottir, Threat Analyst; Duncan Mills, Director of Product Marketing
    Join Cyren threat researcher Tinna Sigurdardottir and industry security product veteran Duncan Mills to learn the top categories of evasive phishing techniques being applied by phishing campaign developers today, and why the use of such techniques is on the upswing.
    This webinar will walk participants step-by-step through examples of email phishing attacks that leverage evasive techniques, and review how these techniques are being incorporated into phishing kits and phishing-as-a-service offerings being sold on both the dark net and the open web. Participants will come away with a perspective on how evasive phishing is evolving in a manner similar to the historic evolution of evasive malware.
  • Cyren CSO Discusses the Future of Email Security at Infosecurity Europe 2019 Recorded: Jul 1 2019 8 mins
    Lior Kohavi, Chief Strategy Officer, Cyren & Paige Bidgood, BrightTALK
    Paige Bidgood from BrightTalk interviews Lior Kohavi, Cyren’s Chief Strategy Officer, about Cyren’s participation at Infosecurity Europe 2019, the future of email security, and how we use our cloud to protect enterprise customers.
  • What Are You Doing About Office 365 Phishing Security? Recorded: Jun 27 2019 51 mins
    Michael Osterman, Principal Analyst, Osterman Research
    This webinar will present insights from a new, in-depth survey of IT and security professionals at large enterprises that use Office 365 for their corporate email. Covering organizations in both the US and UK, the webinar and survey report (a copy of which will be provided to all webinar participants) will give IT and security professionals, from CISOs to email admins, the opportunity to benchmark their own Office 365 security posture and planning with answers from their peers.

    Michael Osterman will cover views expressed on issues like security performance, the most prevalent models for SOCs, SIEM integration, how the migration to Office 365 was managed, types of additional security they’ve deployed, time spent remediating breaches, security budget growth, and how users report suspicious emails, along with expectations on new defensive technologies and services.
  • Phishing kits: democratizing evasive phishing Recorded: Jun 13 2019 5 mins
    Duncan Mills
    Five minute summary recording of Cyren's Infosecurity Europe booth presentation explaining how phishing kits are making phishing campaigns available to even the most non-technical of cyber criminals.
  • Evasive phishing: insight into tactics Recorded: Jun 13 2019 5 mins
    Duncan Mills
    Five minute summary recording of Cyren's Infosecurity Europe booth presentation on evasive phishing tactics.
  • Evasive malware: insight into tactics & defences Recorded: Jun 13 2019 6 mins
    Duncan Mills
    Five minute summary recording of Cyren's Infosecurity Europe booth presentation on evasive malware tactics and defenses.
  • Why You Need Third-Party Solutions for Office 365 Recorded: Jun 6 2019 49 mins
    Michael Osterman, Principal Analyst, Osterman Research
    Office 365 is a capable and robust platform with a wide collection of features and functions. Like any large platform with diverse capabilities and a diverse user base, customers must analyze if it provides the depth of capability or specialized functionality they require in areas like security, archiving, authentication, eDiscovery, encryption, and file sharing.

    To help IT and security managers identify such features or performance gaps, Osterman Research has just published “Why Your Company Needs Third-Party Solutions for Office 365.”

    Join Michael Osterman, Principal Analyst, Osterman Research will review the results contained in the report of detailed research into Office 365’s functionality across several areas.

    Takeaways will include:
    • How prevalent it is for IT organizations using Office 365 today to contract additional security, archiving or other capabilities
    • Limitations in the embedded security included in standard Office 365 packages
    • Considerations in evaluating Microsoft’s Advanced Threat Protection module
    • What is needed to make Office 365’s eDiscovery capabilities really work for you
    • What particular issues must be understood by companies with hybrid environments

    *A complimentary copy of the report will be provided to all webinar attendees.
  • Top 5 Office 365 Phishing Kits to Watch For Recorded: Jun 4 2019 50 mins
    Magni Sigurdsson - Senior Threat Researcher, Cyren
    Have you noticed an uptick in phishing traffic reaching your company’s users? Been impressed by the sophistication of so many phishing sites? Phishing has become an industry, with new services and sophisticated turn-key “phishing kits” allowing nearly anyone to develop sophisticated attacks.

    Join Magni Sigurdsson, Senior Threat Researcher, Cyren as he shares the latest findings on phishing kits, including which brands are the most targeted, the five most-used phishing kits, showing actual examples, reviewing the mechanics of how they work and explaining how both users and security systems can recognize them.

    Takeaways will include:
    • The key phishing trends to look out for in 2019
    • The top phishing kits today in terms of “market share” that users are likely to encounter
    • Techniques that are being applied to phishing web sites and phishing campaigns
    • How users can identify the most sophisticated phishing web sites
  • Gap Analysis Measures the Effectiveness of Your Email Security Recorded: May 23 2019 48 mins
    Stuart Grierson, Lead Senior Solutions Engineer and Duncan Mills, Product Marketing Director
    Whether you use Office 365, a cloud email security service or an on-premises gateway, you should periodically test its effectiveness. This will allow you to quantify how much malware, phishing and spam is evading your email security and getting through to your users.
    Cyren has developed an Email Security Gap Analysis assessment to measure how well a company’s in-place security is performing. Aggregated data on results from assessments done in 2018 have been published and this webinar will review findings in that report, including:
    • Key statistics
    • Case studies and segmented industry data
    • Example emails and threats uncovered during assessments (appropriately anonymized)
    You will also find out how to have your own gap analysis done free of charge.
  • New Attack Vectors: How Threats Have Changed and How to Combat Them Recorded: Apr 25 2019 63 mins
    Tom McNash, Senior Solutions Engineer, Cyren
    In this webinar, Senior Solutions Engineer Tom McNash will review how new threat attack vectors are working, how cyber criminals are building threats in new ways today—whether for malware, phishing or denial-of-service attacks--and what security approach businesses need to be adapting to defend against these attacks. He will also explain how the profile of attackers targeting businesses is changing, and how one traditional form of defence against sophisticated attacks—the appliance sandbox—has itself become the object of attacks.
  • Evasive Phishing Targeting Office 365: What You Need to Know Recorded: Apr 17 2019 45 mins
    Magni Sigurdsson, Senior Threat Researcher, Cyren and Duncan Mills, Director of Product, Cyren
    About This Live Webinar
    Have you noticed an uptick in phishing traffic reaching your company’s users? Phishing has become an industry, with new methods appearing and new “dark web” services increasing the evasiveness and sheer volume of both mass and targeted phishing threats.

    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from real-world security performance assessments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.

    What You Will Learn:
    In this webinar, Cyren’s senior threat analysts will explain the latest phishing techniques and dissect examples of Office 365-targeted phishing campaigns, review how the phishing “industry” works today, and align these developments with data from a recent survey of Office 365 deployments, in order to inform Office 365 administrators and IT managers as they choose among approaches to security.
    Takeaways will include:
    • What phishing campaigns are targeting Office 365 today, what do they look like, and how do they work?
    • What are the latest techniques being used in phishing campaigns to avoid detection?
    • What phishing services are now being provided on the dark web, and what Office 365 credential “phishing kits” are being sold?
    • Are more mass-mailed phishing and targeted phishing campaigns reaching Office 365 users, and if so, by how much has each increased during the past 12 months?
  • Email Security: Why It Probably Isn’t Working, and What To Do Recorded: Apr 4 2019 47 mins
    Michael Osterman of Osterman Research
    Why is email security back on everybody’s agenda?
    Why do email security solutions seem to be improving only slightly in certain areas, and getting worse in others? Or is that not true?
    In the midst of the current phishing and ransomware epidemic, security must get better – but how?

    View this on-demand webinar to hear Michael Osterman of Osterman Research share the responses he received when he recently put these questions to IT managers and security practitioners, and benefit from the insights of an accompanying research paper laying out the reasons for the growing rate of “Business Email Compromise” and what must be done.
  • Why You Need Third-Party Solutions for Office 365 Recorded: Mar 28 2019 50 mins
    Michael Osterman, Principal Analyst, Osterman Research
    Office 365 is a capable and robust platform with a wide collection of features and functions. Like any large platform with diverse capabilities and a diverse user base, customers must analyze if it provides the depth of capability or specialized functionality they require in areas like security, archiving, authentication, eDiscovery, encryption, and file sharing.

    To help IT and security managers identify such feature or performance gaps, Osterman Research has just published a 22-page report entitled “Why Your Company Needs Third-Party Solutions for Office 365.” In this webinar, Michael Osterman will review the results contained in the report of detailed research into Office 365’s functionality across several areas. A complimentary copy of the report will be provided to all webinar attendees.

    What You Will Learn
    This webinar will give IT and security professionals insight into feature and performance gaps in Office 365 they should consider shoring up, as well as what steps companies with Office 365 deployed are taking in terms of supplementary products and services. Takeaways will include:
    • How prevalent it is for IT organizations using Office 365 today to contract additional security, archiving or other capabilities
    • Limitations in the embedded security included in standard Office 365 packages
    • Considerations in evaluating Microsoft’s Advanced Threat Protection module
    • What is needed to make Office 365’s eDiscovery capabilities really work for you
    • What particular issues must be understood by companies with hybrid environments, i.e., those with Office 365 as well as on-premises Exchange, some other on-premises system, or even a second hosted email service.
  • IT-Sicherheit 2019: Ausgeklügelte Phishing und Malware Attacken wie Emotet, Ryuk Recorded: Mar 21 2019 58 mins
    Marcel Leitel, Sales Engineer DACH Cyren
    Die Flut an Cyberattacken ist im vergangenen Jahr deutlich angestiegen und werden in 2019 immer intelligenter und raffinierter. Attacken wie Emotet und TrickBot machten im Januar und Februar ein großer Anteil der Phishing-Angriffe aus. Die Eindringlinge haben es nicht nur auf die IT-Spezialisten in Unternehmen, sondern auch auf Ihre Mitarbeiter abgesehen.

    Unternehmen begegnen dieser Herausforderung häufig mit einer Vielzahl von Sicherheitslösungen nach dem Best-of-Breed-Ansatz. Ein aufwendiges Management, mangelnde Integration und nicht erkannte Sicherheitslücken sind die Folge.
  • Phishing Security for Enterprises using Office 365 Recorded: Mar 7 2019 58 mins
    Michael Osterman, Principal Analyst, Osterman Research and Pete Starr, Senior Director of Solution Engineering, Cyren
    About this live webinar
    The Microsoft Office 365 platform currently blocks over 5 billion phishing messages a year. But as mass and targeted phishing attacks increase in volume, speed and evasiveness, is additional protection needed to secure Office 365 email for your organization?

    To answer this question, Osterman Research’s principal analyst will share insights from a recent study of Office 365 deployments, and Cyren’s global director of solution engineering will walk through the phishing kill chain and point to practical opportunities to enhance defences.


    What you will learn

    This webinar provides IT and security professionals the opportunity to understand phishing security issues for Office 365 deployments. Takeaways will include:
    •What is the current experience of Office 365 deployments in terms of phishing security?
    •What are typical limitations for Office 365 deployments in dealing with today’s phishing threat landscape?
    •Considering how phishing attacks work, what countermeasures are available at each stage?
    •What are 10 steps organizations using Office 365 can take to stop phishing attacks?
  • Top 5 Office 365 Phishing Kits to Watch For Recorded: Feb 28 2019 51 mins
    Magni Sigurdsson - Senior Threat Researcher, Cyren
    Have you noticed an uptick in phishing traffic reaching your company’s users? Been impressed by the sophistication of so many phishing sites? Phishing has become an industry, with new services and sophisticated turn-key “phishing kits” allowing nearly anyone to develop sophisticated attacks.

    In this webinar, senior threat researcher Magni Sigurdsson will share the latest findings on phishing kits, including which brands are the most targeted, and go in-depth on the five most-used phishing kits, showing actual examples, reviewing the mechanics of how they work—including the evasive tactics utilized to evade detection—and explaining how both users and security systems can recognize them.

    What You Will Learn
    This webinar provides IT and security professionals from network admins to CISO’s the opportunity to understand the latest techniques being used by phishing sites to lure in users, and to get up to speed on the tactics of the top phishing kits being utilized. Takeaways will include:
    • What are the top phishing kits today in terms of “market share” that users are likely to encounter?
    • What brands are being targeted by the phishing kit industry?
    • What techniques are being applied to phishing web sites and phishing campaigns in general) to evade detection?
    • How can users identify the most sophisticated phishing web sites? How can security systems do so?
    • What are the key phishing trends to look out for in 2019?
  • How to choose the right Email & Web Security to complement Microsoft Office 365 Recorded: Jan 31 2019 45 mins
    Duncan Mills - Product Marketing Director Cyren
    The choices available to those evaluating email and web security products and services today are many and confusing. Smaller and mid-sized enterprises will often not have the luxury of a team of staff to do the research and technical evaluation, nor will they have access to third party analyst research to guide them.

    For companies that have migrated to Office 365 or are planning to, the inclusion of some bundled, basic email security exacerbates the complexity of this process.

    What you will learn
    • The most prevalent cyber threats faced by businesses using Office 365
    • The business traits that impact the types of threats you face
    • Which security solutions make the most sense within the context of your business
    • Why email and web security are critically important
    • How to evaluate email and web security solutions
  • Geschicktes Phishing zielt auf Office 365: Was Sie wissen sollten! Recorded: Dec 6 2018 56 mins
    Marcel Leitel, Sales Engineer DACH Cyren
    Ist Ihnen ein Anstieg an Phishing-Verkehr, der Ihre Mitarbeitern erreicht, aufgefallen? Phishing ist eine Industrie geworden, mit neuen Methoden und neuen „Dark Web“-Diensten, die immer schwerer zu erkennen sind und schon durch das bloße Volumen von Massen- und gezielten Phishings auffallen.

    In diesem Webinar wird Marcel Leitel, die neuen Phishing-Technologien erläutern wie auch Beispiele von auf Office-365 zielende Phishing-Kampagnen aufzeigen. Erfahren Sie, wie die heutige Phishing-Industrie funktioniert und gleichen Sie diese Entwicklungen mit den Ergebnissen einer neuen Untersuchung zu Office-365 ab, die Office-365-Administratoren und IT-Manager bei der Auswahl der verschiedenen Sicherheitskonzepte unterstützt.

    Dieses Webinar bietet IT- und Sicherheits- Spezialisten die Möglichkeit, dass bei Office 365 eingesetzte Phishing Phänomen zu verstehen und das Wissen bei der Auswahl ihrer Firmen-Sicherheitsstrategie anzuwenden. Kernlernpunkte sind:

    - Welche Phishing Kampagnen zielen heute auf Office 365? Wie sehen diese aus und wie funktionieren sie?
    - Welche neuesten Techniken werden von Phishing-Kampagnen eingesetzt, um Erkennung zu verhindern?
    - Welche Phishing-Dienste werden im Dark Web angeboten und welche Office 365 ‚phishing kits‘ werden verkauft?
    - Erreichen mehr Massen-Phishings und gezielte Phishing-Kampagnen Office 365 Nutzer und wenn ja, um wie viel ist dies in den letzten 12 Monaten angestiegen?
  • Confronting the Ransomware Crisis: Best Practices for Securing Your Business Recorded: Dec 5 2018 44 mins
    Dan Maier, VP Marketing
    Ransomware such as CryptoLocker, CryptoWall and Locky are targeting businesses with massive hybrid cyber-attacks that leverage both email and the web to fool your employees and penetrate your cyber-defenses. These attacks encrypt all the files on your employees’ computers and demand ransom payments via Bitcoin to decrypt the data.

    So far, law enforcement has been helpless against these attacks, and IT teams are struggling to protect their organizations from these sophisticated threats.

    View this on-demand webinar broadcast to learn how ransomware attacks happen and what you can do to protect your business from them.
Cyren Webinars
More than 1.3 billion users around the world rely on Cyren’s 100% cloud internet security solutions to protect them against cyber attacks and data loss every day. Powered by the world’s largest security cloud, Cyren delivers fast time to protection from cyber threats with award-winning Security as a Service for email, sandboxing, and DNS for enterprises, and embedded threat intelligence solutions for security vendors and service providers. Customers like Google, Microsoft and Check Point are just a few of the businesses that depend on Cyren every day to power their security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Cyren CSO Discusses the Future of Email Security at Infosecurity Europe 2019
  • Live at: Jul 1 2019 12:40 pm
  • Presented by: Lior Kohavi, Chief Strategy Officer, Cyren & Paige Bidgood, BrightTALK
  • From:
Your email has been sent.
or close