Email Security: How to Protect from the Unknown with Simon Crosby
BitDam hosts Bromium Co-Founder, Simon Crosby, discussing the newest unknown cyber threats, why model-driven security can protect from them, and how this can be done in scale with no interference to productivity.
Can BitDam’s attack-agnostic approach really deal with the growing problem of unknown threats?
Join us in this one-time discussion to better understand:
- What makes rapidly evolving unknown threats our No. 1 enemy
- The gaps of data-driven email security
- Why model-driven security is the only way to deal with these threats
- How to scale it while keeping end-user’s productivity
- The actions you need to take to protect your organization’s email from these unknowns
Sometimes 100% cybersecurity is not science fiction. Join us to hear Simon Crosby’s take on that!
RecordedMay 5 202036 mins
Your place is confirmed, we'll send you email reminders
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
This episode focuses on: How do security solutions work, how effective are they and how can the good actors win this never-ending-cat-and-mouse game?
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
This episode focuses on: What is a good payload consists of and what do attackers have to bear in mind when planning and writing down their payload.
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
This episode focuses on droppers - how are they delivered to the end user, how do they evade detection and how do they execute the payload.
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
Roy Rashti, Head of Presale & Professional Services at BitDam
Join us in this four part video series with BitDam’s Cyber Expert, Roy Rashti, who will share some of the phisher’s secrets. Gain a perspective of how phishers plan their scams, how they operate and how you can protect from them.
In this episode we will cover the phisher’s reward:
Using the stolen assets
What makes phishing attacks so popular and lucrative
Why phishing attacks are still successful
How to avoid being tricked and what to look out for
Roy Rashti, Head of Presale & Professional Services at BitDam
Join us in this four part video series with BitDam’s Cyber Expert, Roy Rashti, who will share some of the phisher’s secrets. Gain a perspective of how phishers plan their scams, how they operate and how you can protect from them.
In this episode we will cover:
How phishers design their attack
Selecting the most suitable host
Looks is everything - choosing the right attack look
Distributing the attack: spraying vs. cherry picking
The newest evasion techniques
Roy Rashti, Head of Presale & Professional Services at BitDam
Join us in this four part video series with BitDam’s Cyber Expert, Roy Rashti, who will share some of the phisher’s secrets. Gain a perspective of how phishers plan their scams, how they operate and how you can protect from them.
In this episode we will cover the main decisions taken by phishers:
Picking the prey: business, government or individuals
Selecting the brand to go after
Which companies are more vulnerable to phishers
The luring mechanism and attack packaging
Roy Rashti, Head of Presale & Professional Services at BitDam
To beat your enemies, you must know how they work. In this series of video talks, BitDam’s Cyber Expert, Roy Rashti, will share some of the phisher’s secrets. Getting into the phisher’s mind, episode #1 will cover:
· What’s phishing and how it all started
· Who is the phisher and what motivates them?
· How phishers select their prey
· Phisher’s interruptions and how to overcome them
Join us to get a perspective of how phishers plan their scams, how they operate and how you can protect from it.
Michael Sherwood, City of Las Vegas Norman McKeown, LSH Auto UK Limited Daniel Baird, Grahams the Family Dairy
Join BitDam’s CEO & Co-Founder, Liron Barak, as she hosts CISOs for discussion on the hottest cybersecurity topics nowadays including:
- WFH and the implications on organizations’ information security
- Protecting from ransomware and phishing across all collaboration platforms
- How to deal with the inevitable malware detection gap
Panelists:
Michael Sherwood, City of Las Vegas
Norman McKeown, LSH Auto UK Limited
Daniel Baird, Grahams the Family Dairy Ltd
Roy Rashti, Head of Presale & Professional Services at BitDam
As a cybersecurity professional, you want to be aware of your email security flaws. You may even consider deploying a Breach & Attack Simulation tool. Did you know that you can do it yourself within minutes?
Join our Cyber Expert, Roy Rashti for a practical DIY session on how to assess your email security. The live session will include:
- Introduction to 2 free non-intrusive Breach & Attack Simulation tools
- How to use these tools safely
- Live demos including installation and usage
- How to read a Breach & Attack Simulation report
Following this session, you will be able to test your email security by yourself in less than 20 minutes, and get continuous insight into which threat types penetrate your organization. All that using free tools.
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
This episode focuses on: How do security solutions work, how effective are they and how can the good actors win this never-ending-cat-and-mouse game?
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
This episode focuses on: What is a good payload consists of and what do attackers have to bear in mind when planning and writing down their payload.
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
This episode focuses on droppers - how are they delivered to the end user, how do they evade detection and how do they execute the payload.
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
Roy Rashti, Head of Presale & Professional Services at BitDam
As a cybersecurity professional, you want to be aware of your email security flaws. You may even consider deploying a Breach & Attack Simulation tool. Did you know that you can do it yourself within minutes?
Join our Cyber Expert, Roy Rashti for a practical DIY session on how to assess your email security. The live session will include:
- Introduction to 2 free non-intrusive Breach & Attack Simulation tools
- How to use these tools safely
- Live demos including installation and usage
- How to read a Breach & Attack Simulation report
Following this session, you will be able to test your email security by yourself in less than 20 minutes, and get continuous insight into which threat types penetrate your organization. All that using free tools.
Simon Crosby, Co-founder, Bromium and Maor Hizkiev, Co-Founder and CTO, BitDam
BitDam hosts Bromium Co-Founder, Simon Crosby, discussing the newest unknown cyber threats, why model-driven security can protect from them, and how this can be done in scale with no interference to productivity.
Can BitDam’s attack-agnostic approach really deal with the growing problem of unknown threats?
Join us in this one-time discussion to better understand:
- What makes rapidly evolving unknown threats our No. 1 enemy
- The gaps of data-driven email security
- Why model-driven security is the only way to deal with these threats
- How to scale it while keeping end-user’s productivity
- The actions you need to take to protect your organization’s email from these unknowns
Sometimes 100% cybersecurity is not science fiction. Join us to hear Simon Crosby’s take on that!
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
This episode focuses on: How do security solutions work, how effective are they and how can the good actors win this never-ending-cat-and-mouse game?
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Simon Crosby, Co-founder, Bromium and Maor Hizkiev, Co-Founder and CTO, BitDam
BitDam hosts Bromium Co-Founder, Simon Crosby, discussing the newest unknown cyber threats, why model-driven security can protect from them, and how this can be done in scale with no interference to productivity.
Can BitDam’s attack-agnostic approach really deal with the growing problem of unknown threats?
Join us in this one-time discussion to better understand:
- What makes rapidly evolving unknown threats our No. 1 enemy
- The gaps of data-driven email security
- Why model-driven security is the only way to deal with these threats
- How to scale it while keeping end-user’s productivity
- The actions you need to take to protect your organization’s email from these unknowns
Sometimes 100% cybersecurity is not science fiction. Join us to hear Simon Crosby’s take on that!
Roy Rashti, Head of Presale & Professional Services at BitDam
To really protect your business from cyber threats, you have to better understand your enemy.
In this series of videos, BitDam's cyber expert, Roy Rashti, will share some secrets about how hackers think including:
This episode focuses on: What is a good payload consists of and what do attackers have to bear in mind when planning and writing down their payload.
Join us in this series to understand the hacker perspective and better defend your organization from the most sophisticated cyber threats.
• How hackers plan their attacks (episode #1)
• How hackers deliver attacks to your computer (episode #2)
• The payload and execution (episode #3)
• How to stop the cyber cat & mouse game (episode #4)
Brian Kubas at CBTS, Maor Hizkiev at BitDam and Roy Rashti, BitDam
We invite you to join CBTS and BitDam for "The Blind Spots of Email Security Nobody Speaks About" as we discuss the shocking miss rates from leading providers: O365 ATP, Proofpoint TAP and G Suite Enterprise. Learn what blind spots your organization may have within your current email security.
Join Brian Kubas, Network & Security Product Specialist at CBTS, Maor Hizkiev CTO & Co-founder at BitDam and Roy Rashti, Presale and Professional Services at BitDam to learn:
- Why leading email security products show 23-35% miss rates
- What is the cause of this huge detection gap?
- How to protect your organization from these unknown threats
Email Security: How to Protect from the Unknown with Simon CrosbySimon Crosby, Co-founder, Bromium and Maor Hizkiev, Co-Founder and CTO, BitDam[[ webcastStartDate * 1000 | amDateFormat: 'MMM D YYYY h:mm a' ]]35 mins