Hi [[ session.user.profile.firstName ]]

Automating Abuse Inbox Management as Part of Phishing IR

As phishing-trained employees report more suspicious emails to their security team, it’s creating a new problem: effectively managing a growing abuse inbox with limited resources.

Manually investigating suspicious emails with URLs can take 4-10 minutes per incident, with most being false positives that waste time and effort.

With ThreatConnect’s automation features and definitive phishing URL analysis from SlashNext, SOC and IR teams can save huge amounts of time and resources, all while improving phishing IR response times and security.

Join experts from ThreatConnect and SlashNext for a 30 minute webinar on automating phishing URL analysis as part of phishing IR. You’ll learn:

- How to build and execute phishing IR playbooks with ThreatConnect
- How SlashNext performs run-time analysis of URLs to return definitive verdicts (not threat scores) at scale
- How automating phishing IR can improve phishing IR response times and security
Recorded Mar 6 2020 26 mins
Your place is confirmed,
we'll send you email reminders
Presented by
ThreatConnect and SlashNext
Presentation preview: Automating Abuse Inbox Management as Part of Phishing IR

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Automating Incident Response Recorded: Mar 6 2020 2 mins
    SlashNext
    Automating URL analysis with SOAR playbooks can save huge amounts of time and resources. SOC and IR teams can leverage an automated phishing URL analysis service that provides accurate, definitive results and enrichment to speed execution of phishing IR playbooks, analysis, and reporting. This video shows how SlashNext provides accurate phishing URL analysis on-demand and at scale with pre-built integration apps for leading SOAR platforms.
  • Automating Abuse Inbox Management as Part of Phishing IR Recorded: Mar 6 2020 26 mins
    ThreatConnect and SlashNext
    As phishing-trained employees report more suspicious emails to their security team, it’s creating a new problem: effectively managing a growing abuse inbox with limited resources.

    Manually investigating suspicious emails with URLs can take 4-10 minutes per incident, with most being false positives that waste time and effort.

    With ThreatConnect’s automation features and definitive phishing URL analysis from SlashNext, SOC and IR teams can save huge amounts of time and resources, all while improving phishing IR response times and security.

    Join experts from ThreatConnect and SlashNext for a 30 minute webinar on automating phishing URL analysis as part of phishing IR. You’ll learn:

    - How to build and execute phishing IR playbooks with ThreatConnect
    - How SlashNext performs run-time analysis of URLs to return definitive verdicts (not threat scores) at scale
    - How automating phishing IR can improve phishing IR response times and security
  • SEER™ Threat Detection Technology Recorded: Nov 19 2019 1 min
    SlashNext
    SEER catches phishing threats that evade URL inspection and domain reputation analysis methods.
  • Real-Time Phishing Threat Intelligence Recorded: Aug 5 2019 2 mins
    Lisa O'Reilly
    Real-time phishing defense for email, web, mobile. Broader threat coverage for fake login pages, rogue browser extensions, scareware, credit card and money transfer scams, phishing exploits, phishing C2s. Detection powered by computer vision, natural language processing, live behavioral analysis. Near zero false positives.
  • [Live Demo] Real-Time Phishing Threat Intelligence Recorded: May 22 2019 27 mins
    Mark McDaniel, Senior Director of Technical Services at SlashNext, Inc.
    Threat intelligence that covers new types of phishing threats is essential for understanding and defending against previously unknown zero-hour threats.

    During this 30-minute demo you’ll see:

    A real-time list of zero-hour phishing URLs, Domains, IPs that can be used for blocking purposes.

    Slashnext’s behavioral analysis approach that leverages our Session Emulation and Environment Reconnaissance™ (SEER) threat detection technology.

    Phishing threat intelligence covering six major categories: credential stealing, scareware, rogue software, phishing exploits, social engineering scams, phishing callback C2s.
  • See What Phishing Threats You’re Missing--Live Demo Recorded: Apr 24 2019 29 mins
    Mark McDaniel, Senior Director of Technical Services at SlashNext, Inc.
    SlashNext Real-Time Phishing Threat Intelligence Live Demo

    Threat intelligence that covers new types of phishing threats is essential for understanding and defending against previously unknown zero-hour threats.

    During this 30-minute demo you’ll see:

    Slashnext’s behavioral analysis approach that leverages our Session Emulation and Environment Reconnaissance™ (SEER) threat detection technology.

    Real-time threat intelligence covering five major phishing categories: credential stealing, scareware, rogue software, phishing exploits, social engineering scams, phishing callback C2s

    Real-Time Phishing Threat Intelligence that is more automated by evaluating many more characteristics of the site, so it’s able to render a definitive verdict, malicious or benign.

    A continuously updated list of zero-hour phishing URLs, Domains, IPs that can be used for blocking purposes
  • Understanding and Defending Against Zero-Hour Social Engineering Threats Recorded: Apr 15 2019 39 mins
    Hear from security expert Atif Mushtaq (founder and CEO of SlashNext) and Jan Liband, SlashNext CMO, to learn how your IT sec
    Threat actors are going after the human attack surface with new kinds of phishing and social engineering techniques, tactics, and procedures (TTPs). While credential stealing remains popular, new types of phishing and direct-to-browser attack vectors are evading existing multi-level security controls. Threat intelligence that covers new types of phishing threats is essential for understanding and defending against previously unknown zero-hour threats.

    During this 30-minute webinar you’ll learn about:

    - TTPs for the new generation of evasive phishing threats
    - What existing phishing threat intelligence feeds are missing
    - Benefits and use cases for real-time phishing threat intelligence
  • Catching Live Phishing Attacks Recorded: Apr 4 2019 40 mins
    Atif Mushtaq, SlashNext Founder and CEO
    Learn about new phishing attack vectors, fast-moving phishing sites, and how you can catch them. According to Verizon’s 2018 Data Breach Investigations Report, phishing attacks are at the start of over 90% of data breaches and financial losses. Today's phishing attacks employ short-lived sites, most lasting just 4-8 hours. And attack vectors are expanding beyond email to social media, IM, ads, pop-ups, rogue browser extensions, and more. New attack methods exploit the human attack surface within targeted organizations and evade existing security defenses by design.

    In this webcast, you’ll learn:

    How the phishing attack landscape has changed
    How modern phishing attacks are designed to evade existing defenses
    What’s needed to catch live phishing attacks and protect your employees
    Featured Speaker

    Atif Mushtaq
    SlashNext Founder and CEO

    A noted security expert who has spent most of his career on the front lines of the war against cybercrime, Atif has worked with law enforcement and other global organizations to take down some of the world’s biggest malware networks. Atif is the former lead architect of FireEye’s core malware detection system and is the visionary behind SlashNext's innovative approach to real-time phishing site detection.
Real-Time Anti-Phishing Solutions
The phishing threat landscape has changed. Stay ahead of zero-hour threats with real-time threat intelligence and targeted phishing defense.

On this channel, you will learn techniques, tactics, and procedures for the new generation of evasive phishing threats and what's required for modern phishing threat detection.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Automating Abuse Inbox Management as Part of Phishing IR
  • Live at: Mar 6 2020 6:00 pm
  • Presented by: ThreatConnect and SlashNext
  • From:
Your email has been sent.
or close