Hi [[ session.user.profile.firstName ]]

Alerts Don’t Remediate Themselves: Best Practices for Dealing with Cyber Threats

Evasive phishing, BEC, and fraud attacks are getting past existing email defenses. The sophistication of these attacks helps them avoid perimeter detection and fool your employees, including those who’ve been through Security Awareness and Training programs.

But most security teams are overwhelmed with alerts of potential threats, which does nothing to remediate them. In this webinar, we'll cover how and why threats still make it to the inbox, and how you can develop an adaptive and automated plan to remediate threats quickly without drowning in alerts.
Live online Apr 28 2:00 pm UTC
or after on demand 60 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Mike Fleck, Senior Director of Sales Engineering at Cyren
Presentation preview: Alerts Don’t Remediate Themselves: Best Practices for Dealing with Cyber Threats

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Verstärken Sie Ihre Verteidigung gegen Microsoft Office 365 Phishing Angriffe… May 18 2021 8:30 am UTC 60 mins
    Marcel Leitel, Senior Sales Engineer DACH Cyren
    Vor einem Jahr hat sich unsere Arbeitswelt schlagartig verändert. Aufgrund der Gefährdung durch die Corona-Pandemie mussten zahlreiche Angestellte ihr Büro nach Hause verlegen. Bis heute arbeitet eine Vielzahl der Angestellten noch im Homeoffice. Viele Firmen haben sich entschlossen, zu Microsoft 365 zu wechseln, um den die veränderte Arbeitssituation anzupassen. Angreifer nutzen diesen Trend aus und täglich wird von Angriffen auf M365 berichtet. Laut eines Beitrags des IT-Sicherheit Verlags zitiert diese eine Vectra AI Studie*, dass 71 Prozent der Microsoft Office 365-Implementierungen im letzten Jahr nicht nur einmal, sondern im Durchschnitt sieben Mal von einem Account Take-Over betroffen waren. International an der Spitze lag Deutschland mit neun unerlaubten Account-Übernahmen.
    In diesem Webinar erfahren Sie von unserem Senior Sales Engineer, Herr Marcel Leitel, warum eine mehrschichtige Sicherheit für Ihre M365 E-Mail Sicherheit essenziell ist, um diese Anzahl von Angriffen zu reduzieren. Darüber hinaus erklärt er warum Microsofts Office 365 ATP und EOP vielen Sicherheitsteams ein falsches Sicherheitsgefühl vermittelt und wie man mit Cyren Inbox Security Ihrem E-Mail-Sicherheitsteam helfen kann, schneller und besser auf Angriffe zu reagieren.
  • Alerts Don’t Remediate Themselves: Best Practices for Dealing with Cyber Threats Apr 28 2021 6:00 pm UTC 60 mins
    Mike Fleck, Senior Director of Sales Engineering at Cyren
    Evasive phishing, BEC, and fraud attacks are getting past existing email defenses. The sophistication of these attacks helps them avoid perimeter detection and fool your employees, including those who’ve been through Security Awareness and Training programs.

    But most security teams are overwhelmed with alerts of potential threats, which does nothing to remediate them. In this webinar, we'll cover how and why threats still make it to the inbox, and how you can develop an adaptive and automated plan to remediate threats quickly without drowning in alerts.
  • Alerts Don’t Remediate Themselves: Best Practices for Dealing with Cyber Threats Apr 28 2021 2:00 pm UTC 60 mins
    Mike Fleck, Senior Director of Sales Engineering at Cyren
    Evasive phishing, BEC, and fraud attacks are getting past existing email defenses. The sophistication of these attacks helps them avoid perimeter detection and fool your employees, including those who’ve been through Security Awareness and Training programs.

    But most security teams are overwhelmed with alerts of potential threats, which does nothing to remediate them. In this webinar, we'll cover how and why threats still make it to the inbox, and how you can develop an adaptive and automated plan to remediate threats quickly without drowning in alerts.
  • How to remediate Office 365 Phishing Failures Recorded: Mar 10 2021 52 mins
    Lior Kohavi, CSO & EVP, Advanced Solutions, Cyren
    With tensions high and IT resources stretched to the limit, our "new normal" of remote work is the perfect storm for cloud inbox security.

    Organizations using Microsoft 365's email platform consistently report higher rates of successful evasive phishing attacks. And it's no surprise — even Microsoft’s native Advanced Threat Protection (ATP) and Exchange Online Protection (EOP) have malicious catch rates of 0.15 percent, which is significantly lower than the rate of other solution providers.

    In this webinar, you'll learn:
    • Why Microsoft 365 ATP and EOP give many security teams a false sense of security
    • Which kinds of evasive phishing are likely to bypass Microsoft 365’s conventional defenses
    • Why you need an additional layer of email security that automatically reduces the number of email threats reaching your employees

    Chief Strategy Officer, Lior Kohavi, will also demo the latest release of Cyren Inbox Security, which continuously scans every message for threats and anomalous behaviors. When a threat is identified, Cyren can automatically “claw back” suspicious messages from all impacted inboxes, saving security teams hours of manual review and remediation.
  • How to remediate Office 365 Phishing Failures Recorded: Mar 10 2021 53 mins
    Lior Kohavi, CSO & EVP, Advanced Solutions, Cyren
    With tensions high and IT resources stretched to the limit, our "new normal" of remote work is the perfect storm for cloud inbox security.

    Organizations using Microsoft 365's email platform consistently report higher rates of successful evasive phishing attacks. And it's no surprise — even Microsoft’s native Advanced Threat Protection (ATP) and Exchange Online Protection (EOP) have malicious catch rates of 0.15 percent, which is significantly lower than the rate of other solution providers.

    In this webinar, you'll learn:

    • Why Microsoft 365 ATP and EOP give many security teams a false sense of security
    • Which kinds of evasive phishing are likely to bypass Microsoft 365’s conventional defenses
    • Why you need an additional layer of email security that automatically reduces the number of email threats reaching your employees

    Chief Strategy Officer, Lior Kohavi, will also demo the latest release of Cyren Inbox Security, which continuously scans every message for threats and anomalous behaviors. When a threat is identified, Cyren can automatically “claw back” suspicious messages from all impacted inboxes, saving security teams hours of manual review and remediation.
  • Supercharging Your Product and Services with Cyren Malware Detection Engine Recorded: Feb 11 2021 54 mins
    Dr. Richard Ford, CTO, Cyren
    The current pandemic has created an opportune moment for threat actors to evolve their tactics and deliver innovative attacks via email, web, and malicious files. Security vendors are constantly trying to improve the efficacy of their products by ensuring rapid detection of evolving threats.

    For over two decades, Cyren’s Malware Detection Engine (powered by GlobalView™ Threat Intelligence Cloud) has provided developers with accurate and timely insights that have allowed them to detect advanced, embedded threats effectively and rapidly within email, web, and malicious files.

    In this webinar Cyren’s CTO, Dr. Richard Ford, will discuss:

    • The evolution of the malware threat
    • Why businesses handling 3rd party content should consider using Cyren’s Malware Detection Engine
    • How product developers can quickly add best-of-breed protection to any application using Cyren’s Malware Detection Engine

    Join us to learn how our Malware Detection Engine can keep your customers safe—now and in the future.
  • Supercharging Your Product and Services with Cyren Malware Detection Engine Recorded: Feb 11 2021 54 mins
    Dr. Richard Ford, CTO, Cyren
    The current pandemic has created an opportune moment for threat actors to evolve their tactics and deliver innovative attacks via email, web, and malicious files. Security vendors are constantly trying to improve the efficacy of their products by ensuring rapid detection of evolving threats.
    For over two decades, Cyren’s Malware Detection Engine (powered by GlobalView™ Threat Intelligence Cloud) has provided developers with accurate and timely insights that have allowed them to detect advanced, embedded threats effectively and rapidly within email, web, and malicious files.
    In this webinar Cyren’s CTO, Dr. Richard Ford, will discuss:
    • The evolution of the malware threat
    • Why businesses handling 3rd party content should consider using Cyren’s Malware Detection Engine
    • How product developers can quickly add best-of-breed protection to any application using Cyren’s Malware Detection Engine
    Join us to learn how our Malware Detection Engine can keep your customers safe—now and in the future.
  • Effektive Security-Awareness Maßnahmen im Bereich Office365 Recorded: Jan 28 2021 42 mins
    Sebastian Koehler, Regional Sales Director, Cyren und Marcel Leitel, Senior Sales Engenieer, Cyren
    Weltweit haben Unternehmen es im Zeitalter von automatisierten und schnell handelnden Cyberbedrohungen mit noch nie da gewesenen Herausforderungen zu tun. Im Laufe des Jahres 2020 haben diese Risiken dramatisch zugenommen. Grade im Bereich Phishing haben Threat Researcher von Cyren verstärkt Phishing und betrügerische Angriffe gesehen, die trotz aller vorherigen Scans in der Inbox der Mitarbeiter landen.

    Um gegen Cyber-Gefahren gewappnet zu sein, sollten Unternehmen eine technisch solide Sicherheitsinfrastruktur aufsetzen, aber auch den menschlichen Faktor nicht vergessen.
    Denn was hilft ein umfassendes Sicherheitskonzept, wenn es von den Mitarbeitern nicht gelebt wird?

    In diesem Webinar geben wir Ihnen Best Practices an die Hand, wie Sie Ihre Mitarbeiter sensibilisieren, statt nur zu informieren.
  • Like shooting Phish in a Barrel: 3 Perspectives on Email Protection Recorded: Jan 21 2021 45 mins
    Matt Bishop, University of California Davis | Richard Ford, Cyren | Josh Douglas, Mimecast
    In this round table, we bring together three vastly different perspectives on the same problem to see where we are, what we can do about it, and what our future looks like. Our round table discussion includes the vendor, customer, and researcher perspective. While each of us experiences the problems we face differently by seeing our vulnerabilities and opportunities from different viewpoints we can find the best possible solution.

    We will begin by discussing how we got here and what today’s threat landscape looks like with respect to email-centric threats. We will then explore the raft of mitigation techniques available, where they work… and where they don’t. We will also look at the system writ large, and explore the impact systemic changes, such as the shift of business mail to O365, are likely to have on attackers. Finally, we will discuss how we see things changing in the future: what will the conversation in five years look like?

    At every point in this discussion, our focus is on engaging a diverse set of views and pointing out practical steps that defenders can take to provide the most cost-effective and pragmatic solutions to protect their users from a threat that is only going to grow.

    In this webinar you will learn:
    • How to think about the email vector the same way the attacker does: it’s about the people, not the medium
    • What attacks we see today and why they work
    • How to build a comprehensive strategy that helps secure the messaging channel
    • How to measure and prove to your boss you built a comprehensive strategy that helped secure the messaging channel
    • How we think these kinds of attacks will change in a coevolutionary system
  • Supercharge Your Product and Services with Cyren Malware Detection Engine Recorded: Jan 20 2021 55 mins
    Dr. Richard Ford, CTO, Cyren
    The current pandemic has created an opportune moment for threat actors to evolve their tactics and deliver innovative attacks via email, web, and malicious files. Security vendors are constantly trying to improve the efficacy of their products by ensuring rapid detection of evolving threats.

    For over two decades, Cyren’s Antivirus SDK (powered by GlobalView™ Threat Intelligence Cloud) has provided developers with accurate and timely insights that have allowed them to detect advanced, embedded threats effectively and rapidly within email, web, and malicious files.

    In this webinar Cyren’s CTO, Dr. Richard Ford, will discuss:

    • The evolution of the malware threat
    • Why businesses handling 3rd party content should consider using Cyren’s Antivirus SDK
    • How product developers can quickly add best-of-breed protection to any application using Cyren’s Antivirus SDK

    Join us to learn how Cyren’s Antivirus SDK can keep your customers safe—now and in the future.
  • Does Phishing Prevention Require Better Technology, Detection, or Strategy? Recorded: Dec 3 2020 58 mins
    Lior Kohavi, CSO & EVP, Advanced Solutions, Cyren, Tinna Sigurdardottir, Threat Researcher, Cyren
    Phishing has proved to be a consistent problem in 2020 as the traditional form of fraud and financial extortion has evolved to include Business Email Compromise and spear-phishing attacks. Combined, these threats prove successful for attackers, and a problem for the SOC as they struggle to stop them efficiently.

    Therefore, is a better or extra solution needed for phishing prevention? In this webinar, we will look at whether there is a need for better inbox protection, for better security for Office 365 or if the issue can be resolved with what we have already.

    By attending this session, you will takeaway:

    • New tools to better fight against phishing threats
    • If Office 365 can keep up with inbound threats
    • How to arm your SOC with the ability to spot and detect phishing emails
  • Does Phishing Prevention Require Better Technology, Detection, or Strategy? Recorded: Dec 3 2020 57 mins
    Lior Kohavi, CSO & EVP, Advanced Solutions, Cyren, Tinna Sigurdardottir, Threat Researcher, Cyren
    Phishing has proved to be a consistent problem in 2020 as the traditional form of fraud and financial extortion has evolved to include Business Email Compromise and spear-phishing attacks. Combined, these threats prove successful for attackers, and a problem for the SOC as they struggle to stop them efficiently. Therefore, is a better or extra solution needed for phishing prevention? In this webinar, we will look at whether there is a need for better inbox protection, for better security for Office 365 or if the issue can be resolved with what we have already.

    By attending this session, you will takeaway:
    • New tools to better fight against phishing threats
    • If Office 365 can keep up with inbound threats
    • How to arm your SOC with the ability to spot and detect phishing emails
  • Leveraging Threat Intelligence to Maximize Protection Recorded: Nov 17 2020 52 mins
    Michael Osterman, Principal Analyst, Osterman Research and Matt Mosley, Vice President of Products, Cyren
    Security teams face an uphill battle when responding to constantly evolving attacker TTPs. It is of paramount importance that security teams possess the ability to respond quickly to these ever-changing threats, in as close to real time as possible - to deal with them properly.
    Quality threat intelligence can empower security analysts and threat researchers to track the source of these evolving threats and/or prevent them in the future. Threat intelligence represents a “force multiplier” – it gives security staff members more enhanced data, better information, and the needed contextual insights so that they can make more informed decisions more quickly.
    In this webinar, our experts will discuss:

    • How common threats are continually innovating to flummox existing organizational defenses
    • How correctly operationalized threat intelligence can be an effective force multiplier
    • How context can add value to threat intelligence and speed up investigations

    Join our guest speaker Michael Osterman, Principal Analyst, Osterman Research along with Matt Mosley, Cyren’s Vice President of Products to learn how quality threat intelligence can ensure an effective security posture against evolving threats.
  • Leveraging Threat Intelligence to Maximize Protection Recorded: Nov 17 2020 54 mins
    Michael Osterman, Principal Analyst, Osterman Research and Matt Mosley, Vice President of Products, Cyren
    Security teams face an uphill battle when responding to constantly evolving attacker TTPs. It is of paramount importance that security teams possess the ability to respond quickly to these ever-changing threats, in as close to real time as possible - to deal with them properly.
    Quality threat intelligence can empower security analysts and threat researchers to track the source of these evolving threats and/or prevent them in the future. Threat intelligence represents a “force multiplier” – it gives security staff members more enhanced data, better information, and the needed contextual insights so that they can make more informed decisions more quickly.
    In this webinar, our experts will discuss:

    • How common threats are continually innovating to flummox existing organizational defenses
    • How correctly operationalized threat intelligence can be an effective force multiplier
    • How context can add value to threat intelligence and speed up investigations

    Join our guest speaker Michael Osterman, Principal Analyst, Osterman Research along with Matt Mosley, Cyren’s Vice President of Products to learn how quality threat intelligence can ensure an effective security posture against evolving threats.
  • A Buyer’s Guide to Actionable Threat Intelligence Recorded: Oct 22 2020 56 mins
    Michael Osterman, Principal Analyst, Osterman Research and Matt Mosley, VP of Products, Cyren
    The fundamental nature of cybersecurity represents a continuous battle between bad actors, some of which are highly sophisticated and well-funded; and those who must defend networks, users, and data sources against their attacks. Unfortunately, most organizations report they are not doing well at protecting against various types of threats and attacks, especially those related to phishing and email compromise. The well-publicized cybersecurity skills shortage is a significant contributor to these problems.

    Threat intelligence can help to enable security analysts, threat researchers and others to deal more effectively with cyber criminals by providing the information to better understand current and past attacks, and it can give them the ability to predict and thwart future attacks. However, the market for threat intelligence is large, complex, and increasingly difficult to navigate.

    On this webinar, our experts will discuss:

    • The different types of threat intelligence, and the strengths and weaknesses of each
    • How to identify the right threat intelligence for your organization
    • Questions to ask your prospective threat intelligence vendor
    Join our guest speaker Michael Osterman, President, Osterman Research along with Matt Mosley, Cyren’s Vice President of Products to learn how to select the right threat intelligence to keep your organization safe—now and in the future.
  • A Buyer’s Guide to Actionable Threat Intelligence Recorded: Oct 22 2020 56 mins
    Michael Osterman, President, Osterman Research and Matt Mosley, Cyren’s Vice President of Products
    The fundamental nature of cybersecurity represents a continuous battle between bad actors, some of which are highly sophisticated and well-funded; and those who must defend networks, users, and data sources against their attacks. Unfortunately, most organizations report they are not doing well at protecting against various types of threats and attacks, especially those related to phishing and email compromise. The well-publicized cybersecurity skills shortage is a significant contributor to these problems.

    Threat intelligence can help to enable security analysts, threat researchers and others to deal more effectively with cyber criminals by providing the information to better understand current and past attacks, and it can give them the ability to predict and thwart future attacks. However, the market for threat intelligence is large, complex, and increasingly difficult to navigate.

    On this webinar, our experts will discuss:

    • The different types of threat intelligence, and the strengths and weaknesses of each
    • How to identify the right threat intelligence for your organization
    • Questions to ask your prospective threat intelligence vendor

    Join our guest speaker Michael Osterman, President, Osterman Research along with Matt Mosley, Cyren’s Vice President of Products to learn how to select the right threat intelligence to keep your organization safe—now and in the future.
  • Nutzen Sie Ihre Mitarbeiter bei der Einbindung aller Ressourcen gegen Phishing Recorded: Aug 27 2020 54 mins
    Marcel Leitel, Senior Sales Engineer DACH Cyren
    Laut BSI enthalten 72% der E-Mails Links auf Phishing-Seiten, mit denen Informationen abgegriffen oder Schadprogramme unbemerkt heruntergeladen werden. Der „Faktor Mensch“ wird besonders in der Corona-Zeit stark ausgenutzt.

    Gerade im Bereich M365 haben wir in letzter Zeit verstärkt Phishing und betrügerische Angriffe gesehen, die trotz aller vorherigen Scans in der Inbox der Mitarbeiter landen. Auch Microsoft selbst hat hierzu einen aktuellen Blog Post über Microsoft / Office 365 User aus 62 Ländern veröffentlicht, die von spezifischen Phishing Kampagnen betroffen waren.

    In unserem Phishing Awareness Training Webinar werden wir über Trends bei E-Mail basierten Bedrohungen, wie Phishing, Spam und zielgerichtete Angriffe sprechen. Da Ihre Mitarbeiter vermehrt schädliche Emails erhalten, sollten sie zu einem Teil der Verteidigung eines Unternehmens werden, indem sie lernen, Phishing-Angriffe zu erkennen und erfolgreich abzuwehren.

    Lernpunkte:

    - Verstehen Sie Phishing – Wieso ist es der häufigste Angriffsvektor und warum wird vermehrt auf Office 365 gezielt?
    - Wie erkennt man Phishing Emails und worauf sollte man achten?
    - Was sind die neusten Trends?
    - Kann man die Phishing Industrie stoppen?
  • Cybersecurity Threat Detection and Prevention Recorded: Aug 17 2020 61 mins
    Jo Peterson | Adi Pradeep | Brad Moldenhauer | Dr. Richard Ford | Homayun Yaqub
    Cyberthreats are viewed as a significant risk to organizations. They are capable of disrupting core operations and inflicting serious damage to brands and reputations.

    A study by Cybersecurity Ventures predicts these crimes will cost the world $6 trillion a year by 2021.

    Join this panel discussion to:
    - Review today’s expansive attack surface and the various ways bad actors penetrate networks
    - Discuss existing and emerging cyber threats
    - Understand policies, tools and best practices used to protect organizations as new threats emerge
    - Explore the roles that user training and education, skill development and governance play in defending against threats

    Panel:
    Jo Peterson, VP Cloud & Security Services, Clarify360 (moderator)
    Adarsh "Adi" Pradeep, Cybersecurity Consultant
    Brad Moldenhauer, CISO, Americas, Zscaler
    Dr. Richard Ford, CTO, Cyren
    Homayun Yaqub, Global Security Strategist, Forcepoint
  • Addressing Today’s Cyber Threats Recorded: Aug 17 2020 42 mins
    Pete Starr, Director of Sales Engineering at Cyren
    The “right” threat intelligence helps enterprises understand their attackers, their motives, and how best to defend against evolving attacker TTPs. Threat intelligence isn’t supposed to be one-size-fits-all. Every enterprise has its own security priorities and threat intelligence is intended to help teams effectively and efficiently achieve them.

    Attackers consistently use current world events to their advantage by developing new exploits and techniques that bypass perimeter defences. We'll discuss why organizations should move from a gateway-based single-pass inspection model to a layered security model that includes continuous email monitoring and detection at the inbox to effectively combat today’s phishing threats. Not only is this approach more effective than the traditional single-pass inspection model, but it also alleviates the labour-intensive process of investigating, containing, responding to, and remediating malicious emails by leveraging user input in an automated way.

    Join this webinar and learn how your security team can make your threat detection and response more effective by choosing the right threat intelligence solution.
  • Using Threat Intelligence to Make Meaningful Decisions Recorded: Jul 29 2020 60 mins
    Guest speaker Brian Kime, Senior Analyst at Forrester, Dr. Richard Ford, CTO and Matt Mosley, VP of Products at Cyren
    Security practitioners and executives leverage threat intelligence to gain visibility and context into evolving threats, understand their potential impact on the enterprise and improve detection and response times. Insights gained from threat intelligence allow security teams to make meaningful decisions to protect the organization without impacting business continuity and productivity.
    With the threat landscape constantly evolving, security teams are heavily reliant on timely and high-fidelity intelligence to detect and respond to threats. However, data is not intelligence, and threat feeds alone cannot support the growing needs of SOC analysts, threat hunters and incident responders.

    Join this panel discussion to learn:
    • Why threat intelligence plays a critical role in defining organizational security posture
    • The difference between threat data and threat intelligence… and its impact on your business continuity and productivity
    • How enterprise security teams can leverage contextual threat intelligence to their advantage
    Join our guest speaker Brian Kime, Senior Analyst, Security & Risk at Forrester Research along with Dr. Richard Ford, Cyren’s Chief Technology Officer and Matt Mosley, Cyren’s Vice President of Products to learn how to keep your enterprise safe—now and in the future.
Cyren Webinars
More than 1.3 billion users around the world rely on Cyren’s 100% cloud internet security solutions to protect them against cyber attacks and data loss every day. Powered by the world’s largest security cloud, Cyren delivers fast time to protection from cyber threats with award-winning Security as a Service for email, sandboxing, and DNS for enterprises, and embedded threat intelligence solutions for security vendors and service providers. Customers like Google, Microsoft and Check Point are just a few of the businesses that depend on Cyren every day to power their security.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Alerts Don’t Remediate Themselves: Best Practices for Dealing with Cyber Threats
  • Live at: Apr 28 2021 2:00 pm
  • Presented by: Mike Fleck, Senior Director of Sales Engineering at Cyren
  • From:
Your email has been sent.
or close