Hi [[ session.user.profile.firstName ]]

How to stop Phishing Threats for Microsoft 365

Secure Email Gateways are struggling to protect against today’s sophisticated email threats. The solution is to deploy a layer of security directly in the mailbox. Watch this 19-minute video and find out how Cyren Inbox Security can help by:
- Automatically identifying evasive phishing attacks through continuous monitoring of every email in every user’s mailbox
- Detecting account takeover via AI-powered mailbox behaviour analysis that monitors all user interactions in the mailbox and identifies anomalies
- Removing the burden on the IT and SOC teams by automatically remediating threats from all inboxes, eliminating the need for manual analysis, response and remediation for most incidents
- When needed, enabling rapid investigation, containment, and response to all security incidents
- Easily to deploy, you'll be up and protecting all mailboxes in minutes
Recorded Apr 17 2020 19 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Stuart Grierson, Senior Sales Engineer
Presentation preview: How to stop Phishing Threats for Microsoft 365

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Nutzen Sie Ihre Mitarbeiter bei der Einbindung aller Ressourcen gegen Phishing Aug 27 2020 9:00 am UTC 60 mins
    Marcel Leitel, Sales Engineer DACH Cyren
    Laut BSI enthalten 72% der E-Mails Links auf Phishing-Seiten, mit denen Informationen abgegriffen oder Schadprogramme unbemerkt heruntergeladen werden. Der „Faktor Mensch“ wird besonders in der Corona-Zeit stark ausgenutzt.

    Gerade im Bereich M365 haben wir in letzter Zeit verstärkt Phishing und betrügerische Angriffe gesehen, die trotz aller vorherigen Scans in der Inbox der Mitarbeiter landen. Auch Microsoft selbst hat hierzu einen aktuellen Blog Post über Microsoft / Office 365 User aus 62 Ländern veröffentlicht, die von spezifischen Phishing Kampagnen betroffen waren.

    In unserem Phishing Awareness Training Webinar werden wir über Trends bei E-Mail basierten Bedrohungen, wie Phishing, Spam und zielgerichtete Angriffe sprechen. Da Ihre Mitarbeiter vermehrt schädliche Emails erhalten, sollten sie zu einem Teil der Verteidigung eines Unternehmens werden, indem sie lernen, Phishing-Angriffe zu erkennen und erfolgreich abzuwehren.

    Lernpunkte:

    - Verstehen Sie Phishing – Wieso ist es der häufigste Angriffsvektor und warum wird vermehrt auf Office 365 gezielt?
    - Wie erkennt man Phishing Emails und worauf sollte man achten?
    - Was sind die neusten Trends?
    - Kann man die Phishing Industrie stoppen?
  • Cybersecurity Threat Detection and Prevention Aug 17 2020 3:00 pm UTC 60 mins
    Jo Peterson | Adi Pradeep | Stan Lowe | Dr. Richard Ford | Homayun Yaqub
    Cyberthreats are viewed as a significant risk to organizations. They are capable of disrupting core operations and inflicting serious damage to brands and reputations.

    A study by Cybersecurity Ventures predicts these crimes will cost the world $6 trillion a year by 2021.

    Join this panel discussion to:
    - Review today’s expansive attack surface and the various ways bad actors penetrate networks
    - Discuss existing and emerging cyber threats
    - Understand policies, tools and best practices used to protect organizations as new threats emerge
    - Explore the roles that user training and education, skill development and governance play in defending against threats

    Panel:
    Jo Peterson, VP Cloud & Security Services, Clarify360 (moderator)
    Adarsh "Adi" Pradeep, Cybersecurity Consultant
    Stan Lowe, CISO, Zscaler
    Dr. Richard Ford, CTO, Cyren
    Homayun Yaqub, Global Security Strategist, Forcepoint
  • Addressing Today’s Cyber Threats Aug 17 2020 12:00 pm UTC 60 mins
    Pete Starr, Director of Sales Engineering at Cyren
    The “right” threat intelligence helps enterprises understand their attackers, their motives, and how best to defend against evolving attacker TTPs. Threat intelligence isn’t supposed to be one-size-fits-all. Every enterprise has its own security priorities and threat intelligence is intended to help teams effectively and efficiently achieve them.

    Attackers consistently use current world events to their advantage by developing new exploits and techniques that bypass perimeter defences. We'll discuss why organizations should move from a gateway-based single-pass inspection model to a layered security model that includes continuous email monitoring and detection at the inbox to effectively combat today’s phishing threats. Not only is this approach more effective than the traditional single-pass inspection model, but it also alleviates the labour-intensive process of investigating, containing, responding to, and remediating malicious emails by leveraging user input in an automated way.

    Join this webinar and learn how your security team can make your threat detection and response more effective by choosing the right threat intelligence solution.
  • Using Threat Intelligence to Make Meaningful Decisions Recorded: Jul 29 2020 60 mins
    Guest speaker Brian Kime, Senior Analyst at Forrester, Dr. Richard Ford, CTO and Matt Mosley, VP of Products at Cyren
    Security practitioners and executives leverage threat intelligence to gain visibility and context into evolving threats, understand their potential impact on the enterprise and improve detection and response times. Insights gained from threat intelligence allow security teams to make meaningful decisions to protect the organization without impacting business continuity and productivity.
    With the threat landscape constantly evolving, security teams are heavily reliant on timely and high-fidelity intelligence to detect and respond to threats. However, data is not intelligence, and threat feeds alone cannot support the growing needs of SOC analysts, threat hunters and incident responders.

    Join this panel discussion to learn:
    • Why threat intelligence plays a critical role in defining organizational security posture
    • The difference between threat data and threat intelligence… and its impact on your business continuity and productivity
    • How enterprise security teams can leverage contextual threat intelligence to their advantage
    Join our guest speaker Brian Kime, Senior Analyst, Security & Risk at Forrester Research along with Dr. Richard Ford, Cyren’s Chief Technology Officer and Matt Mosley, Cyren’s Vice President of Products to learn how to keep your enterprise safe—now and in the future.
  • Join Forrester - Using Threat Intelligence to Make Meaningful Decisions Recorded: Jul 29 2020 60 mins
    Guest speaker Brian Kime, Senior Analyst at Forrester, Dr. Richard Ford, CTO and Matt Mosley, VP of Products at Cyren
    Security practitioners and executives leverage threat intelligence to gain visibility and context into evolving threats, understand their potential impact on the enterprise and improve detection and response times. Insights gained from threat intelligence allow security teams to make meaningful decisions to protect the organization without impacting business continuity and productivity.
    With the threat landscape constantly evolving, security teams are heavily reliant on timely and high-fidelity intelligence to detect and respond to threats. However, data is not intelligence, and threat feeds alone cannot support the growing needs of SOC analysts, threat hunters and incident responders.

    Join this panel discussion to learn:
    • Why threat intelligence plays a critical role in defining organizational security posture
    • The difference between threat data and threat intelligence… and its impact on your business continuity and productivity
    • How enterprise security teams can leverage contextual threat intelligence to their advantage
    Join our guest speaker Brian Kime, Senior Analyst, Security & Risk at Forrester Research along with Dr. Richard Ford, Cyren’s Chief Technology Officer and Matt Mosley, Cyren’s Vice President of Products to learn how to keep your enterprise safe—now and in the future.
  • Threat Intelligence -Helping Enterprises Tackle New Email-Borne Security Threats Recorded: Jul 23 2020 32 mins
    Pete Starr, Director of Sales Engineering at Cyren
    The “right” threat intelligence helps enterprises understand their attackers, their motives, and how best to defend against evolving attacker TTPs. Threat intelligence isn’t supposed to be one-size-fits-all. Every enterprise has its own security priorities and threat intelligence is intended to help teams effectively and efficiently achieve them.

    With the threat landscape constantly evolving, security teams are heavily reliant on timely and high-fidelity intelligence to detect and respond to threats. However, data is not intelligence, and threat feeds alone cannot support the growing needs of SOC analysts, threat hunters and incident responders.
    Join this webinar, listen to the customer Use Case and see Cyren’s Threat InDepth in action:
    • Phishing & Fraud URL Intelligence
    • Malware URL Intelligence
    • Malware File Intelligence
    • IP Reputation Intelligence
  • Email Security Strategies & Solutions Recorded: Jul 14 2020 62 mins
    Michael Thoma | Arif Hameed, Equifax | Chris Wallace, CISO | Lior Kohavi, Cyren
    With email security breaches constantly making headlines, it is crucial for organisations to be ahead of the curve. Join this interactive panel of industry experts as they discuss the latest trends in email security and how to prevent becoming the next international headline.

    Join this Q&A panel to learn more about:

    - Emerging trends in email attacks
    - How to stay on top of the latest threats
    - Best solutions to protect your organization

    Moderator: Michael Thoma, Principal Consultant at the Crypsis Group
    Panelists: Arif Hameed, Senior Director, Client Security at Equifax
    Lior Kohavi, Chief Strategy Officer and EVP for Advanced Solutions, Cyren
    Chris Wallace, Chief Information Security Officer
  • How to stop Phishing Threats for Office 365? Recorded: Jul 14 2020 46 mins
    Pete Starr, Director of Sales Engineering at Cyren
    This webinar covers the Cyren Inbox Security product which offers a new layer of automated security for Office 365 to detect and remediate phishing, BEC and malware threats that have penetrated existing email gateways and reached the user mailbox.

    You've invested heavily in protecting your Office 365 users, but phishing emails are still reaching their inboxes. We'll discuss why organizations should move from a gateway-based single-pass inspection model to a layered security model that includes continuous email monitoring and detection at the inbox to effectively combat today’s phishing threats.

    Not only is this approach more effective than the traditional single-pass inspection model, but it also alleviates the labor-intensive process of investigating, containing, responding to, and remediating malicious emails by leveraging user input in an automated way.

    Join this webinar to learn:
    • Why protecting at the Gateway is no longer good enough
    • Learn how to automate the remediation of phish that pass perimeter defenses
    • How to engage your end-users, employees, customer and partners to support your anti-phishing challenge
  • Cyren Inbox Security – Produkt Demonstration Recorded: Jun 19 2020 48 mins
    Marcel Leitel, Sales Engineer DACH Cyren
    Während dieser Aufnahme, werden Sie durch Cyren Inbox Security geführt. Erfahren Sie, wie Cyren Inbox Security Ihr Unternehmen vor evasive Phishing, BEC und betrügerische Angriffe schützen kann.

    Die heutigen Cyber-Angriffe können den bestehenden E-Mail-Schutz durchdringen. Diese Attacken sind so ausgefeilt, dass sie vom Perimeterschutz nicht erkannt werden und Ihre Mitarbeiter in die Irre führen, auch solche, die eine Sicherheitsschulung absolviert haben. Cyren Inbox Security schafft eine ständige, anpassungsfähige und automatisierte Sicherheitsebene direkt im Postfach des Nutzers, wo sie am meisten gebraucht wird. Als nativer Cloud-Dienst bietet Cyren Inbox Security:

    - Kontinuierliche Überwachung und Detektion
    - Automatisierte Reaktion und Behebung
    - Crowd-Sourcing-Benutzerdetektion
  • A reality check for Email Security - why you need Mailbox-Level Protection Recorded: Jun 10 2020 60 mins
    Joseph Blankenship, VP Research Director, Security & Risk at Forrester Research & Lior Kohavi, CSO Cyren
    You've invested heavily in protecting your Office 365 users, but phishing emails are still reaching their inboxes. We'll discuss why organizations should move from a gateway-based single-pass inspection model to a layered security model that includes continuous email monitoring and detection at the inbox to effectively combat today’s phishing and malware threats.

    Not only is this approach more effective than the traditional single-pass inspection model, but it also alleviates the labor-intensive process of investigating, containing, responding to, and remediating malicious emails by leveraging user input in an automated way.

    Join this webinar to learn:
    • Why protecting at the Gateway is no longer good enough
    • Learn how to automate the remediation of phish that pass perimeter defenses
    • How to engage your end-users, employees, customer and partners to support your anti-phishing challenge

    Join our guest speaker Joseph Blankenship, VP Research Director, Security & Risk at Forrester Research and Lior Kohavi, Chief Strategy Officer and EVP for Advanced Solutions at Cyren to keep your employees safe—now and in the future.
  • Join Forrester: Email Security - why do you need Mailbox-Level Protection? Recorded: Jun 10 2020 58 mins
    Joseph Blankenship, VP Research Director, Security & Risk at Forrester Research & Lior Kohavi, CSO Cyren
    You've invested heavily in protecting your Office 365 users, but phishing emails are still reaching their inboxes. We'll discuss why organizations should move from a gateway-based single-pass inspection model to a layered security model that includes continuous email monitoring and detection at the inbox to effectively combat today’s phishing and malware threats.

    Not only is this approach more effective than the traditional single-pass inspection model, but it also alleviates the labor-intensive process of investigating, containing, responding to, and remediating malicious emails by leveraging user input in an automated way.

    Join this webinar to learn:
    • Why protecting at the Gateway is no longer good enough
    • Learn how to automate the remediation of phish that pass perimeter defenses
    • How to engage your employees to support your anti-phishing challenge

    Join our guest speaker Joseph Blankenship, VP Research Director, Security & Risk at Forrester Research and Lior Kohavi, CSO & EVP for Advanced Solutions at Cyren to keep your employees safe—now and in the future.
  • How to stop Phishing Threats for Office 365? Recorded: Jun 10 2020 32 mins
    Pete Starr, Director of Sales Engineering at Cyren
    This webinar covers the Cyren Inbox Security product which offers a new layer of automated security for Microsoft 365 to detect and remediate phishing, BEC and malware threats that have penetrated existing email gateways and reached the user mailbox.
  • Quarantined and Exposed: Evolving Threats in a Remote Working World Recorded: May 28 2020 24 mins
    Harli Aquino, Cyren AVLab Team Lead and Kervin Alintanahin, Threat Analyst at Cyren
    Attackers have consistently leveraged current world events to their advantage by evolving their attack TTPs to bypass perimeter defenses. Overnight, COVID-19 has caused enterprises to deploy technologies, policies, and resources to enable employees to work remotely. This rapid roll-out and the resulting confusion has left many enterprises and their employees vulnerable to the constantly changing threat landscape. Join this webinar to learn:

    - How old technologies are being leveraged to bypass threat defenses

    - Examples of real threats bypassing perimeter defenses

    - How organizations can protect themselves and their employees


    Join Harli Aquino, Cyren AVLab Team Lead and Threat Analyst Kervin Alintanahin to keep your employees safe—now and in the future.
  • Quarantined and Exposed: Evolving Threats in a Remote Working World Recorded: May 28 2020 24 mins
    Harli Aquino, Cyren AVLab Team Lead and Kervin Alintanahin, Threat Analyst at Cyren
    Attackers have consistently leveraged current world events to their advantage by evolving their attack TTPs to bypass perimeter defenses. Overnight, COVID-19 has caused enterprises to deploy technologies, policies, and resources to enable employees to work remotely. This rapid roll-out and the resulting confusion has left many enterprises and their employees vulnerable to the constantly changing threat landscape. Join this webinar to learn:

    - How old technologies are being leveraged to bypass threat defenses

    - Examples of real threats bypassing perimeter defenses

    - How organizations can protect themselves and their employees


    Join Harli Aquino, Cyren AVLab Team Lead and Threat Analyst Kervin Alintanahin to keep your employees safe—now and in the future.
  • 2020 Threat-Report: Schützen Sie sich vor Phishing-Attacken Recorded: May 28 2020 65 mins
    Marcel Leitel, Sales Engineer DACH Cyren
    Der neuste Threat-Report von Cyren thematisiert, wie Phishing-Attacken weiterhin bestehende Sicherheits-Gateways umgehen und momentan die Nummer 1 der Gefahren für Unternehmen sind. Von massenhaften, Botnet-gesteuerten Ausbrüchen bis hin zu sehr gezielten Angriffe mit BEC Attacken, Spearphishing und Whaling-Taktiken: Jede Firma und jeder Angestellte ist in Gefahr, zur Zielscheibe zu werden.

    In diesem Webinar bespricht Marcel Leitel, Senior Sales Engineer der DACH Region, wie Phishing auf bestehende und E-Hosting Plattformen wie Microsoft 365 zielen und das gerade in Zeiten des Corona Virus. Sie werden erfahren, warum Cyberkriminelle Phishing lukrativ finden, warum neue Phishing Abwehr-Strategien benötigt werden, und wie Sie Ihre Angestellten, Abläufe und Ihren Ruf vor Phishing-Attacken schützen können.
  • How to stop Phishing Threats for Microsoft 365 Recorded: Apr 17 2020 19 mins
    Stuart Grierson, Senior Sales Engineer
    Secure Email Gateways are struggling to protect against today’s sophisticated email threats. The solution is to deploy a layer of security directly in the mailbox. Watch this 19-minute video and find out how Cyren Inbox Security can help by:
    - Automatically identifying evasive phishing attacks through continuous monitoring of every email in every user’s mailbox
    - Detecting account takeover via AI-powered mailbox behaviour analysis that monitors all user interactions in the mailbox and identifies anomalies
    - Removing the burden on the IT and SOC teams by automatically remediating threats from all inboxes, eliminating the need for manual analysis, response and remediation for most incidents
    - When needed, enabling rapid investigation, containment, and response to all security incidents
    - Easily to deploy, you'll be up and protecting all mailboxes in minutes
  • Defeat Pandemic Related Phishing Attacks with Inbox Detection & Response Recorded: Apr 16 2020 42 mins
    Pete Starr, Global Director of Sales Engineering at Cyren
    Phishing is evading email defences and reaching users’ inboxes especially now during the times of the Corona Pandemic. If your email security gateway later discovers a threat it has delivered, it is too late. Inbox Detection & Response (IDR), referred to in a recent paper by Gartner as Cloud Email Security Supplements is a new way of thinking about email security. It deploys directly into the inbox where it can continuously monitor emails and when a new threat is discovered it can automate response and remediation across every mailbox.
    Join security industry veteran, Pete Starr, to learn how IDR:
    • Creates an email defence-in-depth architecture to protect from evasive phishing attacks
    • Engages users at the point of risk by providing simple threat indicators and on-request scans
    • Automates response and remediation with M-SOAR, to remove the burden on your security analysts

    Want to find out more before registering? Read the IDR Vision Paper.
    [https://pages.cyren.com/rs/944-PGO-076/images/Inbox_Detection_and_Response_Vision.pdf]
  • 2020 Threat Report: Phishing Prevention during a Pandemic Recorded: Apr 9 2020 36 mins
    Pete Starr, Global Director of Sales Engineering at Cyren
    Cyren’s latest threat report discusses how phishing attacks continue to circumvent legacy security gateways and are the top threat targeting businesses. From massive-scale, botnet-driven outbreaks to highly focused attacks using business email compromise (BEC), spear phishing, and whaling techniques - every company and employee is at risk of becoming a target.

    In this webinar, Cyren experts will review how phishing is targeting both legacy gateways and email hosting services like Microsoft 365, especially in times of the most recent pandemic. You will learn what evasive phishing techniques are most widely adopted, how supply chain risk makes certain industries more vulnerable, and how you can protect your employees, operations, and reputation from a phishing attack.
  • Phishing Threats Overview for Legacy Gateways and Microsoft 365 Recorded: Apr 2 2020 37 mins
    Tom McNash, Senior Solutions Engineer, Cyren
    Cyren’s latest threat report discusses how phishing attacks continue to circumvent legacy security gateways and are the top threat targeting businesses. From massive-scale, botnet-driven outbreaks to highly focused attacks using business email compromise (BEC), spear phishing, and whaling techniques - every company and employee is at risk of becoming a target.

    In this webinar, Cyren experts will review how phishing is targeting both legacy gateways and email hosting services like Microsoft 365, and comment on several topics covered in the report, like what evasive phishing techniques are most widely adopted, how supply chain risk makes certain industries more vulnerable, and how you can protect your employees, operations, and reputation from a phishing attack.
  • Phishing Threats Overview for Legacy Gateways and Microsoft 365 Recorded: Apr 2 2020 37 mins
    Pete Starr, Global Director of Sales Engineering at Cyren
    Cyren’s latest threat report discusses how phishing attacks continue to circumvent legacy security gateways and are the top threat targeting businesses. From massive-scale, botnet-driven outbreaks to highly focused attacks using business email compromise (BEC), spear phishing, and whaling techniques - every company and employee is at risk of becoming a target.

    In this webinar, Cyren experts will review how phishing is targeting both legacy gateways and email hosting services like Microsoft 365, and comment on several topics covered in the report, like what evasive phishing techniques are most widely adopted, how supply chain risk makes certain industries more vulnerable, and how you can protect your employees, operations, and reputation from a phishing attack.
Cyren Webinars
More than 1.3 billion users around the world rely on Cyren’s 100% cloud internet security solutions to protect them against cyber attacks and data loss every day. Powered by the world’s largest security cloud, Cyren delivers fast time to protection from cyber threats with award-winning Security as a Service for email, sandboxing, and DNS for enterprises, and embedded threat intelligence solutions for security vendors and service providers. Customers like Google, Microsoft and Check Point are just a few of the businesses that depend on Cyren every day to power their security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: How to stop Phishing Threats for Microsoft 365
  • Live at: Apr 17 2020 2:30 pm
  • Presented by: Stuart Grierson, Senior Sales Engineer
  • From:
Your email has been sent.
or close