Hi [[ session.user.profile.firstName ]]

Talking Phish: Battling Account Takeover with Stylometry

Account Takeover Attacks (ATO) and Business Email Compromise (BEC) are the two biggest problems facing security teams in 2020. The phishing emails that are sent as part of an Account Takeover Attack (ATO) come in many forms with new schemes being developed every day. Keeping your supply chain trained to spot these evolving schemes is nearly impossible. Thankfully, INKY is combating account takeover for you with new methods.

During this webcast, Dave Baggett, CEO of INKY Technology, will show examples of ATO and highlight INKY’s newest capabilities to combat them.

Key Takeaways:

• What are the latest phishing threats facing enterprises?
• How exactly are these attacks getting passed the secure email gateways?
• What are the newest best practices to prevent these attacks?
Recorded Apr 29 2021 27 mins
Your place is confirmed,
we'll send you email reminders
Presented by
Dave Baggett, CEO, INKY
Presentation preview: Talking Phish: Battling Account Takeover with Stylometry

Network with like-minded attendees

  • [[ session.user.profile.displayName ]]
    Add a photo
    • [[ session.user.profile.displayName ]]
    • [[ session.user.profile.jobTitle ]]
    • [[ session.user.profile.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(session.user.profile) ]]
  • [[ card.displayName ]]
    • [[ card.displayName ]]
    • [[ card.jobTitle ]]
    • [[ card.companyName ]]
    • [[ userProfileTemplateHelper.getLocation(card) ]]
  • Channel
  • Channel profile
  • Talking Phish: Risking the 1 in 10 Chance of a Catastrophic Phishing Event Recorded: Sep 30 2021 32 mins
    Dave Baggett, CEO, INKY and Roger Kay​ VP of Security Strategy​
    Nearly 90% of all data breaches and threats are a result of human error. When it comes to phishing emails, you are only as strong as your weakest link. Through just one compromised email account, cybercriminals can gain trusted access to an organization's whole network. The only safe way to stop zero day and BEC attacks is to stop them before they get to end users.

    INKY is the only vendor in the cybersecurity industry that is powered by machine learning and computer vision techniques to create individual sender profiles and block BEC attacks for users and most importantly, third-parties.

    During this webcast, Dave Baggett, CEO of INKY, and Roger Kay, VP of Security Strategy, will show the risk of human error in phishing attacks and how INKY's technology is preventing these malicious attacks from happening.

    Key Takeaways:
    • How are phishing attacks getting passed the secure email gateways?
    • How can you ensure business continuity with Intelligent Phishing Security powered by machine learning and AI?
    • what steps can a company take to supplement the core email defense to effectively block BEC, brand forgery, zero-day and more?
  • Talking Phish: Ransomware Attacks Recorded: Aug 31 2021 39 mins
    Dave Baggett, CEO & Vaughn Harring, Director of Media and Analyst Relations
    Targeted ransomware attacks are on the rise. The recent Colonial Pipeline attacks along with many others are clear evidence of this. The ransom amounts are also getting larger. According to a recent report by Verizon, the frequency of ransomware attacks has already doubled this year compared to last. INKY could have stopped these attacks before networks were breached.

    INKY is the only vendor in the cybersecurity industry that uses innovative technology that integrates with existing security to provide an unparalleled barrier against these kinds of incoming phishing threats. With new types of attacks being created on a daily basis this puts your employees at great risk because these criminals play on the ‘human error ‘weakness. With the main access point for almost every ransomware and malware attacks delivered in an email, organizations need to take this problem seriously and be better prepared.

    During this webcast, Dave Baggett, CEO of INKY, and Vaughn Harring, Director of Media and Analyst Relations, will unveil some recent ransomware attacks and show how INKY's technology is preventing them from ever making into your employees inboxes and putting your data at risk.

    In this webinar you will learn that with the right protection in place you can detect and prevent a ransomware attacks from threatening your organization.

    Key Takeaways:
    • How are ransomware attacks getting passed the secure email gateways?
    • How can companies supplement the core email defense to prepare for the increased ransomware attack trends?
    • Action you can take today to improve your defenses against an attack so your employees won’t click links in emails.
    • Why does INKY uses color coded banners to help employees detect malware-ridden email?
  • Talking Phish: Ransomware Attacks Recorded: Jul 22 2021 39 mins
    Dave Baggett, CEO & Vaughn Harring, Director of Media and Analyst Relations
    Targeted ransomware attacks are on the rise. The recent Colonial Pipeline attacks along with many others are clear evidence of this. The ransom amounts are also getting larger. According to a recent report by Verizon, the frequency of ransomware attacks has already doubled this year compared to last. INKY could have stopped these attacks before networks were breached.

    INKY is the only vendor in the cybersecurity industry that uses innovative technology that integrates with existing security to provide an unparalleled barrier against these kinds of incoming phishing threats. With new types of attacks being created on a daily basis this puts your employees at great risk because these criminals play on the ‘human error ‘weakness. With the main access point for almost every ransomware and malware attacks delivered in an email, organizations need to take this problem seriously and be better prepared.

    During this webcast, Dave Baggett, CEO of INKY, and Vaughn Harring, Director of Media and Analyst Relations, will unveil some recent ransomware attacks and show how INKY's technology is preventing them from ever making into your employees inboxes and putting your data at risk.

    In this webinar you will learn that with the right protection in place you can detect and prevent a ransomware attacks from threatening your organization.

    Key Takeaways:
    • How are ransomware attacks getting passed the secure email gateways?
    • How can companies supplement the core email defense to prepare for the increased ransomware attack trends?
    • Action you can take today to improve your defenses against an attack so your employees won’t click links in emails.
    • Why does INKY uses color coded banners to help employees detect malware-ridden email?
  • Talking Phish: Ransomware Attacks Recorded: Jun 29 2021 39 mins
    Dave Baggett, CEO & Vaughn Harring, Director of Media and Analyst Relations
    Targeted ransomware attacks are on the rise. The recent Colonial Pipeline attacks along with many others are clear evidence of this. The ransom amounts are also getting larger. According to a recent report by Verizon, the frequency of ransomware attacks has already doubled this year compared to last. INKY could have stopped these attacks before networks were breached.

    INKY is the only vendor in the cybersecurity industry that uses innovative technology that integrates with existing security to provide an unparalleled barrier against these kinds of incoming phishing threats. With new types of attacks being created on a daily basis this puts your employees at great risk because these criminals play on the ‘human error ‘weakness. With the main access point for almost every ransomware and malware attacks delivered in an email, organizations need to take this problem seriously and be better prepared.

    During this webcast, Dave Baggett, CEO of INKY, and Vaughn Harring, Director of Media and Analyst Relations, will unveil some recent ransomware attacks and show how INKY's technology is preventing them from ever making into your employees inboxes and putting your data at risk.

    In this webinar you will learn that with the right protection in place you can detect and prevent a ransomware attacks from threatening your organization.

    Key Takeaways:
    • How are ransomware attacks getting passed the secure email gateways?
    • How can companies supplement the core email defense to prepare for the increased ransomware attack trends?
    • Action you can take today to improve your defenses against an attack so your employees won’t click links in emails.
    • Why does INKY uses color coded banners to help employees detect malware-ridden email?
  • How to Build a People First Phishing Prevention Defense Recorded: Jun 17 2021 22 mins
    Vin Hardick, Sales Engineer, INKY
    Are you confident that your users can successfully identify and thwart a phishing attempt? To ensure business continuity in an already complex digital work environment, join INKY experts to dive into the expert traps cybercriminals are perpetuating currently. Learn how to empower your end-users to identify and stop cyber criminal’s advanced attacks that often bypass legacy email security tools. Recent research shows that 70.8% of organizations have less than 1 security staff member to every 100, with 49% of those reporting 1 security team member to 500 staff members.* That leaves security staff stretched thin to combat phishing attempts aimed at (mostly) innocent employee actions.

    Join this webinar to:

    - Gain an understanding of tactics cybercriminals are using to trick and lure innocent users, including malicious links, attachment clicking, embedded code

    - Learn how to implement a comprehensive security program that leverages machine learning to drive better user behaviors in end users

    - Leverage INKY’s proprietary Computer Vision to to identify and stop phishing attempts with one look

    - How to automate phishing identification
  • Product Demo: Mobile Phishing Protection Recorded: May 27 2021 30 mins
    Matthew Sywulak
    Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoint and others. Blocking access to these domains would prevent valid use cases from operating, so traditional security controls struggle to keep up. Many modern email security solutions utilize ML/AI based phishing prevention, often focused on the automatic detection of malicious URLs. However, adversaries have learned how to evade these controls.

    INKY Phish Fence provides an innovative new approach to protecting mobile email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.

    During this webcast, Matthew Sywulak will show the top mobile phishing threats and how INKY's machine learning capabilities are preventing these attacks.
  • Talking Phish: Battling Account Takeover with Stylometry Recorded: Apr 29 2021 27 mins
    Dave Baggett, CEO, INKY
    Account Takeover Attacks (ATO) and Business Email Compromise (BEC) are the two biggest problems facing security teams in 2020. The phishing emails that are sent as part of an Account Takeover Attack (ATO) come in many forms with new schemes being developed every day. Keeping your supply chain trained to spot these evolving schemes is nearly impossible. Thankfully, INKY is combating account takeover for you with new methods.

    During this webcast, Dave Baggett, CEO of INKY Technology, will show examples of ATO and highlight INKY’s newest capabilities to combat them.

    Key Takeaways:

    • What are the latest phishing threats facing enterprises?
    • How exactly are these attacks getting passed the secure email gateways?
    • What are the newest best practices to prevent these attacks?
  • INKY Anti-Phish Demo Recorded: Apr 13 2021 30 mins
    Matthew Sywulak
    Watch this exclusive demo.
    The Next Generation of Email Protection
    INKY is an award-winning cloud-based email protection software. It blocks spam, malware, and most importantly — it protects businesses from phishing attacks like no other email security solution can.
  • Product Demo: Mobile Phishing Protection Recorded: Mar 25 2021 30 mins
    Matthew Sywulak
    Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoint and others. Blocking access to these domains would prevent valid use cases from operating, so traditional security controls struggle to keep up. Many modern email security solutions utilize ML/AI based phishing prevention, often focused on the automatic detection of malicious URLs. However, adversaries have learned how to evade these controls.

    INKY Phish Fence provides an innovative new approach to protecting mobile email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.

    During this webcast, Matthew Sywulak will show the top mobile phishing threats and how INKY's machine learning capabilities are preventing these attacks.
  • Supplementing your Email Defense with an Intelligent Phishing Solution Recorded: Mar 9 2021 47 mins
    Scott Haynes, Enterprise Solutions Engineer, INKY
    Chances are your business relies heavily on email as the primary tool used for communicating, meeting setting, and sharing files internally and externally. The challenge is that fraudsters know this too, and perpetuate phishing and attachment attacks every single day. Most businesses are using some form of email security, but with today’s cybercrime climate, it is not enough.
    Register for this webinar to learn:
    •How to ensure business continuity with Intelligent Phishing Security powered by machine learning and AI
    •Steps to supplement the core email defense to effectively block BEC, brand forgery, domain spoofing and more.
    Register Now
  • Talking Phish: Risking the 1 in 10 Chance of a Catastrophic Phishing Event Recorded: Feb 24 2021 32 mins
    Dave Baggett, CEO, INKY and Roger Kay​ VP of Security Strategy​
    Nearly 90% of all data breaches and threats are a result of human error. When it comes to phishing emails, you are only as strong as your weakest link. Through just one compromised email account, cybercriminals can gain trusted access to an organization's whole network. The only safe way to stop zero day and BEC attacks is to stop them before they get to end users.

    INKY is the only vendor in the cybersecurity industry that is powered by machine learning and computer vision techniques to create individual sender profiles and block BEC attacks for users and most importantly, third-parties.

    During this webcast, Dave Baggett, CEO of INKY, and Roger Kay, VP of Security Strategy, will show the risk of human error in phishing attacks and how INKY's technology is preventing these malicious attacks from happening.

    Key Takeaways:
    • How are phishing attacks getting passed the secure email gateways?
    • How can you ensure business continuity with Intelligent Phishing Security powered by machine learning and AI?
    • what steps can a company take to supplement the core email defense to effectively block BEC, brand forgery, zero-day and more?
  • Tackling Phishing in Microsoft Office 365 with INKY Recorded: Feb 17 2021 35 mins
    Matthew Sywulak
    Is your instance of Microsoft Office 365 letting phishing threats in? Even after training your staff, are phishing attacks still slipping through?

    Today’s sophisticated phishing attacks are evolving in ways that evades Microsoft Exchange Online Protection (EOP). Meet INKY and learn how she is helping organizations of all sizes solve for all types of attacks, including Z-WASP Attacks, ZeroFont Attacks, Hidden Microsoft attacks, Zero Day Attacks, and more.

    Join this webinar to learn how with INKY’s Phish Fence you can:

    Leverage machine learning, artificial intelligence, and computer vision to self-adapt to new and evolving threats

    Fully integrate into your existing Office 365 email deployment

    Empower your users to make informed decisions quickly and intuitively to prevent the invisible from getting through

    Register Now
  • Phishing Protection for Google Workspace (formerly G Suite) Recorded: Feb 16 2021 28 mins
    Roger Kay and Vin Hardick
    How are you maintaining email security in google workspace, formally gsuite?
    Google has enabled rudimentary phishing protection in Gmail, letting customers specify their own Sender Policy Framework (SPF) records and cryptographically mark e-mail with DomainKeys Identified Mail (DKIM). But the effectiveness of such outbound protection relies on customers implementing its elements, which mostly benefit recipients of the organization’s email.

    On the inbound side, Google asks administrators to set up a Domain-based Message Authentication, Reporting & Conformance (DMARC) record to check either the SPF record or the DKIM signature on the incoming mail. If either passes, the email is usually let through.
    …And that’s pretty much it for Gmail’s anti-phishing technology.
    INKY Phish Fence provides an innovative new approach to protecting email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.
    Join this webinar to see how layering INKY Phish Fence on top of Gmail will catch a lot more phish.
  • Microsoft Office 365 Phishing Protection Recorded: Dec 17 2020 35 mins
    Matthew Sywulak
    Is your instance of Microsoft Office 365 letting phishing threats in? Even after training your staff, are phishing attacks still slipping through?

    Today’s sophisticated phishing attacks are evolving in ways that evades Microsoft Exchange Online Protection (EOP). Meet INKY and learn how she is helping organizations of all sizes solve for all types of attacks, including Z-WASP Attacks, ZeroFont Attacks, Hidden Microsoft attacks, Zero Day Attacks, and more.

    Join this webinar to learn how with INKY’s Phish Fence you can:

    Leverage machine learning, artificial intelligence, and computer vision to self-adapt to new and evolving threats

    Fully integrate into your existing Office 365 email deployment

    Empower your users to make informed decisions quickly and intuitively to prevent the invisible from getting through

    Register Now
  • Product Demo: Mobile Phishing Protection Recorded: Dec 8 2020 30 mins
    Matthew Sywulak
    Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoint and others. Blocking access to these domains would prevent valid use cases from operating, so traditional security controls struggle to keep up. Many modern email security solutions utilize ML/AI based phishing prevention, often focused on the automatic detection of malicious URLs. However, adversaries have learned how to evade these controls.

    INKY Phish Fence provides an innovative new approach to protecting mobile email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.

    During this webcast, Matthew Sywulak will show the top mobile phishing threats and how INKY's machine learning capabilities are preventing these attacks.
  • Product Demo: Mobile Phishing Protection Recorded: Nov 18 2020 31 mins
    Matthew Sywulak
    Attackers are getting smarter at evading security controls by hosting malicious content on legitimate cloud sites, including Google, Amazon, SharePoint and others. Blocking access to these domains would prevent valid use cases from operating, so traditional security controls struggle to keep up. Many modern email security solutions utilize ML/AI based phishing prevention, often focused on the automatic detection of malicious URLs. However, adversaries have learned how to evade these controls.

    INKY Phish Fence provides an innovative new approach to protecting mobile email users from phishing attacks. Combining Computer Vision, Social Graphing, and Anti-phishing Banners, INKY brings a unique, effective approach to stopping phishing attacks for mobile, desktop, and web email users.

    During this webcast, Matthew Sywulak will show the top mobile phishing threats and how INKY's machine learning capabilities are preventing these attacks.
  • INKY Anti Phishing Demo Recorded: Oct 28 2020 30 mins
    Matthew Sywulak
    Watch this exclusive demo.

    The Next Generation of Email Protection
    INKY is an award-winning cloud-based email protection software. It blocks spam, malware, and most importantly — it protects businesses from phishing attacks like no other email security solution can.
  • Phish Friday: Battling Account Takeover with Stylometry Recorded: Oct 23 2020 28 mins
    Dave Baggett, CEO, INKY
    Account Takeover Attacks (ATO) and Business Email Compromise (BEC) are the two biggest problems facing security teams in 2020. The phishing emails that are sent as part of an Account Takeover Attack (ATO) come in many forms with new schemes being developed every day. Keeping your supply chain trained to spot these evolving schemes is nearly impossible. Thankfully, INKY is combating account takeover for you with new methods.

    During this webcast, Dave Baggett, CEO of INKY Technology, will show examples of ATO and highlight INKY’s newest capabilities to combat them.

    Key Takeaways:

    • What are the latest phishing threats facing enterprises?
    • How exactly are these attacks getting passed the secure email gateways?
    • What are the newest best practices to prevent these attacks?
  • Supplementing your Email Defense with an Intelligent Phishing Solution Recorded: Sep 16 2020 48 mins
    Scott Haynes, Enterprise Solutions Engineer, INKY
    Chances are your business relies heavily on email as the primary tool used for communicating, meeting setting, and sharing files internally and externally. The challenge is that fraudsters know this too, and perpetuate phishing and attachment attacks every single day. Most businesses are using some form of email security, but with today’s cybercrime climate, it is not enough.
    Register for this webinar to learn:
    •How to ensure business continuity with Intelligent Phishing Security powered by machine learning and AI
    •Steps to supplement the core email defense to effectively block BEC, brand forgery, domain spoofing and more.
    Register Now
  • Phish Friday: Hidden Text and Zero Font Recorded: Aug 21 2020 27 mins
    Dave Baggett, CEO and Co-founder, Bukar Alibe, Data Analyst
    Some phishing emails use something called zero font — text hidden in an email by various means. But what exactly is this technique, and why do attackers use it? Join INKY experts as we share phishing emails caught in the wild and explain both the why and how of hidden text and zero font.
Improving email security
We started INKY because we believe in email and wanted to protect it. INKY is changing the industry with mail protection powered by unique computer vision, artificial intelligence, and machine learning. At INKY we set out to give organizations the ability to “see” each email much like a human does, to block phishing attacks that get through every other system.

Embed in website or blog

Successfully added emails: 0
Remove all
  • Title: Talking Phish: Battling Account Takeover with Stylometry
  • Live at: Apr 29 2021 4:30 pm
  • Presented by: Dave Baggett, CEO, INKY
  • From:
Your email has been sent.
or close